🔑 Identity & Access Management

Domain 5 — Choose a game to play

← Back to Domains
🎯

IAM Concept Matcher

Match RBAC, Kerberos, SAML, MFA, MAC, Federation, and Privilege Escalation to their definitions.

Drag & Match
🔐

SESAME Authentication Flow

Arrange the steps of the SESAME protocol in order. Learn the Kerberos-based trusted third-party flow.

Order the Steps
🛡️

Kerberos Authentication Flow

Order the 6 steps of the Kerberos protocol from AS-REQ through mutual authentication.

Order the Steps
👤

IAM Account Scenarios

Match periodic access review scenarios to the correct account type: system, intruder, fraudulent, or inactive employee.

Scenario Match
🗂️

IAM Periodic Access Review

Drag IAM account review scenarios into system, intruder, fraudulent, and no-show employee findings.

Drag & Drop
🔑

OTP Types Matcher

Match HOTP, TOTP, S/KEY, Synchronous, Asynchronous, and Hardcopy OTP types. Clock drift causes false rejections on time-based tokens.

Drag & Match
👁️

Biometrics Matcher

Match Iris Scan, Retina Scan, Fingerprint, Voice, Facial Recognition, and CER to their characteristics. Iris = convenient. Retina = maximum security.

Drag & Match
🌐

IDaaS vs FIM Matcher

FIM enables cross-org trust. IDaaS delivers centralized identity management. Know the trigger keywords for each on the exam.

Drag & Match
🔒

Zero Trust Planes Sorter

Sort PE, PDP, PA into the Control Plane and PEP, Constrained Interfaces, Protected Resources into the Data Plane.

Drag & Sort