Match RBAC, Kerberos, SAML, MFA, MAC, Federation, and Privilege Escalation to their definitions.
Drag & Match 🔐Arrange the steps of the SESAME protocol in order. Learn the Kerberos-based trusted third-party flow.
Order the Steps 🛡️Order the 6 steps of the Kerberos protocol from AS-REQ through mutual authentication.
Order the Steps 👤Match periodic access review scenarios to the correct account type: system, intruder, fraudulent, or inactive employee.
Scenario Match 🗂️Drag IAM account review scenarios into system, intruder, fraudulent, and no-show employee findings.
Drag & DropMatch HOTP, TOTP, S/KEY, Synchronous, Asynchronous, and Hardcopy OTP types. Clock drift causes false rejections on time-based tokens.
Drag & Match 👁️Match Iris Scan, Retina Scan, Fingerprint, Voice, Facial Recognition, and CER to their characteristics. Iris = convenient. Retina = maximum security.
Drag & Match 🌐FIM enables cross-org trust. IDaaS delivers centralized identity management. Know the trigger keywords for each on the exam.
Drag & Match 🔒Sort PE, PDP, PA into the Control Plane and PEP, Constrained Interfaces, Protected Resources into the Data Plane.
Drag & Sort