Chapter 5Identity and Access Management (Domain 5)

SUBDOMAINS

  • 5.1 Control physical and logical access to assets
  • 5.2 Design identification and authentication strategy (e.g., people, devices, and services)
  • 5.3 Federated identity with a third-party service
  • 5.4 Implement and manage authorization mechanisms
  • 5.5 Manage the identity and access provisioning lifecycle
  • 5.6 Implement authentication systems
  1. Henry uses his organizationally provided credentials to log into his workstation and is then able to use services across the organization and in the cloud. What identity solution has his organization implemented?
    1. An access control list
    2. Single sign-on
    3. Multifactor authentication
    4. Role-based access control
  2. Jim's organization-wide implementation ...

Get ISC2 CISSP Certified Information Systems Security Professional Official Practice Tests, 4th Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.