InterviewSolution
This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
Which of the following are consequences of poor identity management? |
|
Answer» Which of the FOLLOWING are CONSEQUENCES of poor identity management? |
|
| 2. |
The bulk of administrative tasks are performed through the ____________ console. |
|
Answer» The BULK of ADMINISTRATIVE TASKS are performed through the ____________ console. |
|
| 3. |
The feature of logging into social networks can be facilitated using Keycloak. |
|
Answer» The FEATURE of logging into SOCIAL NETWORKS can be FACILITATED USING Keycloak |
|
| 4. |
A __________ defines the conditions that must be satisfied to grant access to an object. |
|
Answer» A __________ defines the CONDITIONS that MUST be satisfied to grant access to an object. |
|
| 5. |
The initial realm created is called _________. |
|
Answer» The initial realm created is CALLED _________. |
|
| 6. |
The process of granting access privileges to a user/program is known as ____________. |
|
Answer» The process of granting access privileges to a user/program is known as ____________. |
|
| 7. |
Admin accounts created in the master realm have permissions to view and manage any other realm created on the server instance. |
|
Answer» Admin accounts CREATED in the MASTER realm have PERMISSIONS to view and manage any other realm created on the server instance. |
|
| 8. |
Master realms are usually reserved for super administrators for creating and managing the realms in a system. |
|
Answer» Master realms are usually RESERVED for super administrators for creating and managing the realms in a system. |
|
| 9. |
SAML 2.0 works by exchanging ___________ between the application and the authentication server. |
|
Answer» SAML 2.0 works by EXCHANGING ___________ between the application and the AUTHENTICATION server. |
|
| 10. |
OIDC is a bit more verbose than SAML. |
|
Answer» OIDC is a bit more VERBOSE than SAML. |
|
| 11. |
____________ identify/identifies the type or category of a user. |
|
Answer» ____________ identify/identifies the type or category of a user. |
|
| 12. |
The ________________ feature allows users to be authenticated only once and yet access multiple applications without the need for reauthentication. |
|
Answer» The ________________ feature allows users to be authenticated only once and yet ACCESS multiple applications without the need for reauthentication. |
|
| 13. |
What is the highest level in the hierarchy of realms? |
|
Answer» What is the HIGHEST level in the hierarchy of REALMS? |
|
| 14. |
Keycloak is an Identity Provider (IDP). |
|
Answer» Keycloak is an IDENTITY PROVIDER (IDP) |
|
| 15. |
Which among the following protocols has its roots in SOAP and WS-Specifications? |
|
Answer» Which among the following protocols has its ROOTS in SOAP and WS-Specifications? |
|
| 16. |
Which of the following standard protocols does Keycloak Support? |
|
Answer» Which of the FOLLOWING standard protocols does Keycloak Support? |
|
| 17. |
Identity Management and Identity Access Management are two different disciplines. |
|
Answer» IDENTITY MANAGEMENT and Identity Access Management are two different disciplines. Choose the correct option from below LIST (1)FALSE (2)True Answer:-(1)False |
|
| 18. |
Keycloak can only be used to authenticate applications and not individual users. |
|
Answer» Keycloak can only be used to authenticate APPLICATIONS and not INDIVIDUAL users |
|
| 19. |
A/An ____________ role can be associated with other roles. |
|
Answer» A/An ____________ role can be ASSOCIATED with other roles. |
|
| 20. |
A user can be allocated to only one role. |
|
Answer» A user can be allocated to only ONE role. |
|
| 21. |
Verifying the identity of an entity to allow access to a resource is known as __________. |
|
Answer» Verifying the IDENTITY of an entity to allow ACCESS to a RESOURCE is known as __________. |
|
| 22. |
Keycloak offers fine-grained authorization services. |
|
Answer» Keycloak OFFERS fine-grained AUTHORIZATION services. |
|
| 23. |
________ XML blob is included in a SAML authentication response that provides identity metadata about an authenticated user. |
|
Answer» ________ XML blob is INCLUDED in a SAML AUTHENTICATION response that provides identity METADATA about an authenticated user. |
|
| 24. |
________ protocol is more suited to work with HTML5/Javascript applications due to ease of implementation. |
|
Answer» ________ protocol is more suited to WORK with HTML5/Javascript applications due to ease of implementation. |
|
| 25. |
A/An ________ token contains information about user role mapping. |
|
Answer» A/An ________ token contains information about user role mapping. |
|
| 26. |
The ________ contains information about the user, such as username and email. |
|
Answer» The ________ contains INFORMATION about the user, such as USERNAME and email. |
|
| 27. |
Which among the following is the full-fledged authentication and authorization protocol? |
|
Answer» Which among the following is the full-fledged AUTHENTICATION and AUTHORIZATION protocol? |
|