IAM Basics
Authentication
&
Authorization
Governance
LCM
Access
Reviews
10

Which of the following is a user identity example? 

A) Employee ID

B) IP Address 

C) Software License 

D) Printer Name

A) Employee ID

10

What is an example of authentication? 

A) Approving a leave request 

B) Entering a password to log in

C) Assigning a project 

D) Sending an email

B) Entering a password to log in

10

How does IAM governance support regulatory compliance? 

A) By improving internet connectivity 

B) By ensuring only authorized users access sensitive data

C) By reducing employee headcount 

D) By managing email subscriptions

B) By ensuring only authorized users access sensitive data

10

What is the first step in the identity lifecycle? 

A) Offboarding 

B) Access review 

C) Onboarding

D) Role assignment

C) Onboarding

10

Why are access reviews important for compliance?

A) They help reduce internet usage

B) They ensure only authorized users have access to sensitive systems

C) They improve email communication

D) They increase software installations

B) They ensure only authorized users have access to sensitive systems

10

Which of the following is NOT a benefit of IAM? 

A) Improved security 

B) Easier access control 

C) Increased manual work

D) Better compliance

C) Increased manual work

10

What is the purpose of multi-factor authentication (MFA)? 

A) To simplify login 

B) To increase security by requiring multiple forms of verification

C) To allow anonymous access 

D) To reset passwords automatically

B) To increase security by requiring multiple forms of verification

10

Who is typically responsible for approving access in a governed IAM process? 

A) The IT helpdesk

B) The user's manager or role owner  

C) The HR team 

D) The finance department

B) The user's manager or role owner

10
  1. What is a common challenge in identity lifecycle management?

A) Too many password resets

B) Delayed removal of access after offboarding

C) Lack of internet access

D) Overuse of email

B) Delayed removal of access after offboarding

10

What should be reviewed during an access review?

A) User’s salary

B) User’s access to applications and data

C) User’s training history

D) User’s internet usage

B) User’s access to applications and data

10

Which of these is a common IAM activity? 

A) Software development 

B) Access reviews

C) Hardware installation 

D) Network cabling

B) Access reviews

10

Why should organizations enforce the principle of least privilege? 

A) To give users full access 

B) To reduce risk by limiting access to only what is necessary 

C) To allow temporary access to all users 

D) To simplify password resets  

B) To reduce risk by limiting access to only what is necessary

10

Which of the following is a governance control in IAM? 

A) Role mining 

B) Access certification  

C) Password reset 

D) VPN setup

B) Access certification  

10

What typically happens during the provisioning phase?

A) Access is removed

B) Access is granted based on role

C) Passwords are deleted

D) Training is scheduled

B) Access is granted based on role

10
  1. What should be done if a user has access they no longer need?

A) Leave it unchanged

B) Transfer it to another user

C) Remove or revoke the access

D) Archive it

C) Remove or revoke the access

10

Which of the following best describes the purpose of IAM? 

A) To monitor internet usage 

B) To manage who has access to what systems and data

C) To install software updates 

D) To handle customer complaints

B) To manage who has access to what systems and data

10

What does Single Sign-On (SSO) allow users to do? 

A) Sign in to multiple systems with one set of credentials 

B) Share passwords with others 

C) Access systems without authentication 

D) Use multiple passwords for each system

A) Sign in to multiple systems with one set of credentials

10

Which of these is considered sensitive access? 

A) Access to public documents 

B) Access to cafeteria menu 

C) Access to financial systems 

D) Access to shared calendars

C) Access to financial systems

10

Who is typically responsible for initiating access provisioning?

A) The user

B) The HR team or hiring manager

C) The finance department

D) The helpdesk

B) The HR team or hiring manager

10
  1. What is a common mistake during access reviews?

A) Reviewing access too frequently

B) Removing access for active users

C) Approving access without proper validation

D) Asking users to review their own access

C) Approving access without proper validation

10

What is a common IAM tool used in organizations? 

A) Microsoft Excel 

B) SailPoint

C) Adobe Photoshop 

D) Zoom

B) SailPoint

10

What is an entitlement in IAM? 

A) A user's salary 

B) A user's access rights to resources

C) A user's job title 

D) A user's training record

B) A user's access rights to resources

10

Which of the following helps enforce IAM policies? 

A) Firewall 

B) Access control

C) Antivirus 

D) Email filters

B) Access control

10

What is the purpose of identity lifecycle management?

A) To monitor internet usage

B) To manage user access from onboarding to offboarding

C) To install software

D) To reset passwords

B) To manage user access from onboarding to offboarding

10
  1. What is a certification in the context of access reviews?

A) A training course

B) A formal approval of a user’s access

C) A software license

D) A password reset

B) A formal approval of a user’s access