Identity and Access Management Flashcards
Microsoft 365 Administrator Expert MS-102 Flashcards

| Front | Back |
| How do access tiers enhance security in IAM? | By assigning different levels of access based on user roles or device trustworthiness |
| How does Azure AD B2B differ from Azure AD B2C? | B2B is for business collaboration, while B2C is for consumer identity management |
| What are access reviews in IAM? | Periodic evaluations of user permissions to ensure access is still appropriate |
| What does Just-in-Time (JIT) access refer to in IAM? | Providing temporary access to resources only when needed |
| What does MFA stand for in access management? | Multi-Factor Authentication |
| What does Single Sign-On (SSO) achieve in IAM? | Allows users to access multiple applications with one set of credentials |
| What does the term "identity theft" refer to in the context of IAM? | The unauthorized use of someone’s identity for access or malicious intent |
| What feature enables blocking access from unfamiliar devices in Azure AD? | Conditional Access |
| What is a directory service in IAM? | A database that stores and organizes information about users, groups, and permissions |
| What is a role in access management? | A collection of permissions assigned to a user or group to perform specific tasks |
| What is a security group used for in access management? | To control and manage access permissions for multiple users |
| What is a service principal in Azure AD? | An identity used by applications or services to access Azure resources |
| What is an access token in IAM? | A credential used to enable authorized access to resources |
| What is an API key in IAM? | A unique identifier used to authenticate and authorize access to an application or service |
| What is Azure AD Connect? | A tool to integrate on-premises directories with Azure AD for a hybrid environment |
| What is biometric authentication in IAM? | Using biological traits like fingerprints for verifying user identity |
| What is conditional access in Azure AD? | A feature to enforce access controls based on signals like user location and device |
| What is delegated access in IAM? | Allowing users to act on behalf of others with specific permissions |
| What is identity governance in IAM? | Managing and enforcing policies for user identities, roles, and access rights |
| What is Privileged Identity Management (PIM) in Azure AD? | A tool to manage, control, and monitor access within Azure AD |
| What is the difference between a managed identity and a service principal? | A managed identity is automatically managed by Azure, while a service principal is manually created and configured |
| What is the difference between authentication and authorization? | Authentication verifies identity, while authorization determines access rights |
| What is the difference between user and group in IAM? | A user is an individual account, while a group is a collection of users for simplified access management |
| What is the function of audit logs in IAM? | To track activities related to user access and identify potential security issues |
| What is the primary role of Azure Active Directory? | To manage user identities and provide authentication for cloud applications |
| What is the principle of least privilege in IAM? | Granting users only the minimal access necessary to perform their tasks |
| What is the purpose of a directory synchronization service? | To keep identities consistent between on-premises directories and cloud services |
| What is the purpose of a guest account in IAM? | To provide limited access for external users under controlled conditions |
| What is the purpose of account lifecycle management in IAM? | To manage the creation, maintenance, and deactivation of user accounts |
| What is the purpose of Active Directory Federation Services (ADFS)? | To provide single sign-on (SSO) and streamline authentication across applications |
| What is the purpose of identity federation in IAM? | Connecting and integrating separate identity systems for seamless authentication |
| What is the purpose of identity management in IT? | Ensuring the right individuals have access to the right resources at the right times for the right reasons |
| What is the purpose of shadow IT management in IAM? | Identifying and controlling unauthorized applications and services within an organization |
| What is the relationship between IAM and compliance? | IAM helps enforce security policies to meet regulatory and legal requirements |
| What is the significance of password policies in IAM? | To enforce strong and secure passwords to prevent unauthorized access |
| What is token expiration policy in IAM? | A rule governing how long an access token remains valid |
| What role do identity providers (IdPs) play in IAM? | They authenticate and provide identity assertion for users across systems |
| Why is access revocation important in IAM? | To prevent unauthorized access when a user leaves or changes roles |
| Why is role-based access control (RBAC) useful in IAM? | It simplifies access assignment by associating users with roles instead of individual permissions |
About the Flashcards
Flashcards for the Microsoft 365 Administrator Expert exam provide concise review of identity and access management fundamentals critical for cloud and on-premises security. Students can quickly reinforce the purpose of identity management, distinguish authentication from authorization, and recall key Azure Active Directory services such as Conditional Access, Privileged Identity Management, and directory synchronization.
Each card highlights practical terminology tested on the exam, from MFA, SSO, and RBAC to concepts like least privilege, access reviews, and token policies. By studying definitions, roles, and best practices, learners strengthen their ability to design, implement, and audit secure access controls that meet compliance requirements.
Topics covered in this flashcard deck:
- Identity management basics
- Azure AD services
- Authentication methods & MFA
- Roles, groups & RBAC
- Access governance & reviews
- Tokens & federation