Bash, the Crucial Exams Chat Bot
AI Bot
Identity and Access Management Flashcards
Microsoft 365 Administrator Expert MS-102 Flashcards
| Front | Back |
| How do access tiers enhance security in IAM? | By assigning different levels of access based on user roles or device trustworthiness |
| How does Azure AD B2B differ from Azure AD B2C? | B2B is for business collaboration, while B2C is for consumer identity management |
| What are access reviews in IAM? | Periodic evaluations of user permissions to ensure access is still appropriate |
| What does Just-in-Time (JIT) access refer to in IAM? | Providing temporary access to resources only when needed |
| What does MFA stand for in access management? | Multi-Factor Authentication |
| What does Single Sign-On (SSO) achieve in IAM? | Allows users to access multiple applications with one set of credentials |
| What does the term "identity theft" refer to in the context of IAM? | The unauthorized use of someone’s identity for access or malicious intent |
| What feature enables blocking access from unfamiliar devices in Azure AD? | Conditional Access |
| What is a directory service in IAM? | A database that stores and organizes information about users, groups, and permissions |
| What is a role in access management? | A collection of permissions assigned to a user or group to perform specific tasks |
| What is a security group used for in access management? | To control and manage access permissions for multiple users |
| What is a service principal in Azure AD? | An identity used by applications or services to access Azure resources |
| What is an access token in IAM? | A credential used to enable authorized access to resources |
| What is an API key in IAM? | A unique identifier used to authenticate and authorize access to an application or service |
| What is Azure AD Connect? | A tool to integrate on-premises directories with Azure AD for a hybrid environment |
| What is biometric authentication in IAM? | Using biological traits like fingerprints for verifying user identity |
| What is conditional access in Azure AD? | A feature to enforce access controls based on signals like user location and device |
| What is delegated access in IAM? | Allowing users to act on behalf of others with specific permissions |
| What is identity governance in IAM? | Managing and enforcing policies for user identities, roles, and access rights |
| What is Privileged Identity Management (PIM) in Azure AD? | A tool to manage, control, and monitor access within Azure AD |
| What is the difference between a managed identity and a service principal? | A managed identity is automatically managed by Azure, while a service principal is manually created and configured |
| What is the difference between authentication and authorization? | Authentication verifies identity, while authorization determines access rights |
| What is the difference between user and group in IAM? | A user is an individual account, while a group is a collection of users for simplified access management |
| What is the function of audit logs in IAM? | To track activities related to user access and identify potential security issues |
| What is the primary role of Azure Active Directory? | To manage user identities and provide authentication for cloud applications |
| What is the principle of least privilege in IAM? | Granting users only the minimal access necessary to perform their tasks |
| What is the purpose of a directory synchronization service? | To keep identities consistent between on-premises directories and cloud services |
| What is the purpose of a guest account in IAM? | To provide limited access for external users under controlled conditions |
| What is the purpose of account lifecycle management in IAM? | To manage the creation, maintenance, and deactivation of user accounts |
| What is the purpose of Active Directory Federation Services (ADFS)? | To provide single sign-on (SSO) and streamline authentication across applications |
| What is the purpose of identity federation in IAM? | Connecting and integrating separate identity systems for seamless authentication |
| What is the purpose of identity management in IT? | Ensuring the right individuals have access to the right resources at the right times for the right reasons |
| What is the purpose of shadow IT management in IAM? | Identifying and controlling unauthorized applications and services within an organization |
| What is the relationship between IAM and compliance? | IAM helps enforce security policies to meet regulatory and legal requirements |
| What is the significance of password policies in IAM? | To enforce strong and secure passwords to prevent unauthorized access |
| What is token expiration policy in IAM? | A rule governing how long an access token remains valid |
| What role do identity providers (IdPs) play in IAM? | They authenticate and provide identity assertion for users across systems |
| Why is access revocation important in IAM? | To prevent unauthorized access when a user leaves or changes roles |
| Why is role-based access control (RBAC) useful in IAM? | It simplifies access assignment by associating users with roles instead of individual permissions |
This deck covers managing users, groups, roles, and features like MFA, security groups, and Azure AD configurations.