Bash, the Crucial Exams Chat Bot
AI Bot

Identity and Access Management  Flashcards

Microsoft 365 Administrator Expert MS-102 Flashcards

What is Azure AD Connect?
Ensuring the right individuals have access to the right resources at the right times for the right reasons
Providing temporary access to resources only when needed
A managed identity is automatically managed by Azure, while a service principal is manually created and configured
What is the principle of least privilege in IAM?
What is the difference between a managed identity and a service principal?
What is the purpose of shadow IT management in IAM?
Identifying and controlling unauthorized applications and services within an organization
A tool to integrate on-premises directories with Azure AD for a hybrid environment
What is the purpose of identity management in IT?
Granting users only the minimal access necessary to perform their tasks
What does Just-in-Time (JIT) access refer to in IAM?
FrontBack
How do access tiers enhance security in IAM?By assigning different levels of access based on user roles or device trustworthiness
How does Azure AD B2B differ from Azure AD B2C?B2B is for business collaboration, while B2C is for consumer identity management
What are access reviews in IAM?Periodic evaluations of user permissions to ensure access is still appropriate
What does Just-in-Time (JIT) access refer to in IAM?Providing temporary access to resources only when needed
What does MFA stand for in access management?Multi-Factor Authentication
What does Single Sign-On (SSO) achieve in IAM?Allows users to access multiple applications with one set of credentials
What does the term "identity theft" refer to in the context of IAM?The unauthorized use of someone’s identity for access or malicious intent
What feature enables blocking access from unfamiliar devices in Azure AD?Conditional Access
What is a directory service in IAM?A database that stores and organizes information about users, groups, and permissions
What is a role in access management?A collection of permissions assigned to a user or group to perform specific tasks
What is a security group used for in access management?To control and manage access permissions for multiple users
What is a service principal in Azure AD?An identity used by applications or services to access Azure resources
What is an access token in IAM?A credential used to enable authorized access to resources
What is an API key in IAM?A unique identifier used to authenticate and authorize access to an application or service
What is Azure AD Connect?A tool to integrate on-premises directories with Azure AD for a hybrid environment
What is biometric authentication in IAM?Using biological traits like fingerprints for verifying user identity
What is conditional access in Azure AD?A feature to enforce access controls based on signals like user location and device
What is delegated access in IAM?Allowing users to act on behalf of others with specific permissions
What is identity governance in IAM?Managing and enforcing policies for user identities, roles, and access rights
What is Privileged Identity Management (PIM) in Azure AD?A tool to manage, control, and monitor access within Azure AD
What is the difference between a managed identity and a service principal?A managed identity is automatically managed by Azure, while a service principal is manually created and configured
What is the difference between authentication and authorization?Authentication verifies identity, while authorization determines access rights
What is the difference between user and group in IAM?A user is an individual account, while a group is a collection of users for simplified access management
What is the function of audit logs in IAM?To track activities related to user access and identify potential security issues
What is the primary role of Azure Active Directory?To manage user identities and provide authentication for cloud applications
What is the principle of least privilege in IAM?Granting users only the minimal access necessary to perform their tasks
What is the purpose of a directory synchronization service?To keep identities consistent between on-premises directories and cloud services
What is the purpose of a guest account in IAM?To provide limited access for external users under controlled conditions
What is the purpose of account lifecycle management in IAM?To manage the creation, maintenance, and deactivation of user accounts
What is the purpose of Active Directory Federation Services (ADFS)?To provide single sign-on (SSO) and streamline authentication across applications
What is the purpose of identity federation in IAM?Connecting and integrating separate identity systems for seamless authentication
What is the purpose of identity management in IT?Ensuring the right individuals have access to the right resources at the right times for the right reasons
What is the purpose of shadow IT management in IAM?Identifying and controlling unauthorized applications and services within an organization
What is the relationship between IAM and compliance?IAM helps enforce security policies to meet regulatory and legal requirements
What is the significance of password policies in IAM?To enforce strong and secure passwords to prevent unauthorized access
What is token expiration policy in IAM?A rule governing how long an access token remains valid
What role do identity providers (IdPs) play in IAM?They authenticate and provide identity assertion for users across systems
Why is access revocation important in IAM?To prevent unauthorized access when a user leaves or changes roles
Why is role-based access control (RBAC) useful in IAM?It simplifies access assignment by associating users with roles instead of individual permissions
Front
What is identity governance in IAM?
Click the card to flip
Back
Managing and enforcing policies for user identities, roles, and access rights
Front
What is the purpose of Active Directory Federation Services (ADFS)?
Back
To provide single sign-on (SSO) and streamline authentication across applications
Front
What is a role in access management?
Back
A collection of permissions assigned to a user or group to perform specific tasks
Front
What is the difference between a managed identity and a service principal?
Back
A managed identity is automatically managed by Azure, while a service principal is manually created and configured
Front
Why is role-based access control (RBAC) useful in IAM?
Back
It simplifies access assignment by associating users with roles instead of individual permissions
Front
What is token expiration policy in IAM?
Back
A rule governing how long an access token remains valid
Front
What is the purpose of account lifecycle management in IAM?
Back
To manage the creation, maintenance, and deactivation of user accounts
Front
What does Just-in-Time (JIT) access refer to in IAM?
Back
Providing temporary access to resources only when needed
Front
What is the primary role of Azure Active Directory?
Back
To manage user identities and provide authentication for cloud applications
Front
What does the term "identity theft" refer to in the context of IAM?
Back
The unauthorized use of someone’s identity for access or malicious intent
Front
What does MFA stand for in access management?
Back
Multi-Factor Authentication
Front
Why is access revocation important in IAM?
Back
To prevent unauthorized access when a user leaves or changes roles
Front
What is the difference between user and group in IAM?
Back
A user is an individual account, while a group is a collection of users for simplified access management
Front
What is an access token in IAM?
Back
A credential used to enable authorized access to resources
Front
What is a directory service in IAM?
Back
A database that stores and organizes information about users, groups, and permissions
Front
What is delegated access in IAM?
Back
Allowing users to act on behalf of others with specific permissions
Front
What is the difference between authentication and authorization?
Back
Authentication verifies identity, while authorization determines access rights
Front
What is the function of audit logs in IAM?
Back
To track activities related to user access and identify potential security issues
Front
What role do identity providers (IdPs) play in IAM?
Back
They authenticate and provide identity assertion for users across systems
Front
What does Single Sign-On (SSO) achieve in IAM?
Back
Allows users to access multiple applications with one set of credentials
Front
What is the purpose of a guest account in IAM?
Back
To provide limited access for external users under controlled conditions
Front
What is a service principal in Azure AD?
Back
An identity used by applications or services to access Azure resources
Front
What is an API key in IAM?
Back
A unique identifier used to authenticate and authorize access to an application or service
Front
What is the significance of password policies in IAM?
Back
To enforce strong and secure passwords to prevent unauthorized access
Front
How does Azure AD B2B differ from Azure AD B2C?
Back
B2B is for business collaboration, while B2C is for consumer identity management
Front
What is a security group used for in access management?
Back
To control and manage access permissions for multiple users
Front
What is Azure AD Connect?
Back
A tool to integrate on-premises directories with Azure AD for a hybrid environment
Front
What is the principle of least privilege in IAM?
Back
Granting users only the minimal access necessary to perform their tasks
Front
What are access reviews in IAM?
Back
Periodic evaluations of user permissions to ensure access is still appropriate
Front
What is the purpose of a directory synchronization service?
Back
To keep identities consistent between on-premises directories and cloud services
Front
What is Privileged Identity Management (PIM) in Azure AD?
Back
A tool to manage, control, and monitor access within Azure AD
Front
What is the purpose of shadow IT management in IAM?
Back
Identifying and controlling unauthorized applications and services within an organization
Front
What is conditional access in Azure AD?
Back
A feature to enforce access controls based on signals like user location and device
Front
What feature enables blocking access from unfamiliar devices in Azure AD?
Back
Conditional Access
Front
What is the purpose of identity federation in IAM?
Back
Connecting and integrating separate identity systems for seamless authentication
Front
What is the relationship between IAM and compliance?
Back
IAM helps enforce security policies to meet regulatory and legal requirements
Front
What is the purpose of identity management in IT?
Back
Ensuring the right individuals have access to the right resources at the right times for the right reasons
Front
What is biometric authentication in IAM?
Back
Using biological traits like fingerprints for verifying user identity
Front
How do access tiers enhance security in IAM?
Back
By assigning different levels of access based on user roles or device trustworthiness
1/39
This deck covers managing users, groups, roles, and features like MFA, security groups, and Azure AD configurations.
Share on...
Follow us on...