Identity Security & Advanced IAM Architecture
Rating
0
0
There are no comments for now.
Join this Course
to be the first to leave a comment.
1.
An organisation wants to reduce the risk of privileged credential persistence while maintaining operational efficiency for administrators. Which control BEST addresses this objective?
2.
Which architectural control MOST directly reduces lateral movement risk across administrative environments?
3.
A cloud tenant uses Conditional Access policies extensively. Which configuration introduces the GREATEST hidden risk?
4.
Which OAuth implementation is MOST appropriate for browser-based public applications requiring delegated user access?
5.
Which activity MOST directly supports non-repudiation in PAM environments?
6.
An attacker successfully steals a valid session token from a privileged administrator. Which security control would MOST effectively reduce replay risk?
7.
Which identity governance activity MOST directly validates whether access remains appropriate over time?
8.
Which statement BEST describes Zero Trust architecture?
9.
A service account has Domain Admin privileges because application compatibility requirements were never reviewed. What is the MOST significant security concern?
10.
Which control BEST reduces risk associated with OAuth consent phishing attacks?
11.
What is the MOST important objective of Segregation of Duties (SoD)?
12.
An organisation implements MFA for all privileged users but still experiences account compromise through adversary-in-the-middle phishing kits. Which control would MOST improve resistance?
13.
Which federation weakness MOST directly increases token forgery risk?
14.
Which activity BEST supports identity attack path reduction?
15.
A production identity provider vulnerability is being actively exploited publicly. What should occur FIRST?
16.
Which identity security failure MOST commonly contributes to privilege escalation attacks?
17.
Which logging activity provides the MOST valuable visibility during identity-focused incident investigations?
18.
What is the PRIMARY security benefit of ephemeral privileged access?
19.
Which cloud identity risk is MOST associated with excessive OAuth application permissions?
20.
What is the BEST overall approach to enterprise identity security?