Explore topic-wise InterviewSolutions in .

This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.

1.

Which of the following are consequences of poor identity management?

Answer»

Which of the FOLLOWING are CONSEQUENCES of poor identity management?
Choose the correct option from below list
(1)Financial losses
(2)Data theft
(3)All the OPTIONS
(4)Damage to REPUTATION
(5)Reduced Productivity

Answer:-(3)All the options

2.

The bulk of administrative tasks are performed through the ____________ console.

Answer»

The BULK of ADMINISTRATIVE TASKS are performed through the ____________ console.
Choose the correct option from below list
(1)User Management
(2)Client Management
(3)MASTER realm
(4)Admin

Answer:-(4)Admin

3.

The feature of logging into social networks can be facilitated using Keycloak.

Answer»

The FEATURE of logging into SOCIAL NETWORKS can be FACILITATED USING Keycloak
Choose the correct option from below list
(1)True
(2)False

Answer:-(1)True

4.

A __________ defines the conditions that must be satisfied to grant access to an object.

Answer»

A __________ defines the CONDITIONS that MUST be satisfied to grant access to an object.
Choose the correct option from below list
(1)POLICY
(2)Scope
(3)Permission

Answer:-(1)Policy

5.

The initial realm created is called _________.

Answer»

The initial realm created is CALLED _________.
Choose the CORRECT OPTION from below list
(1)Initial realm
(2)Master realm
(3)Demo realm
(4)Root realm

Answer:-(2)Master realm

6.

The process of granting access privileges to a user/program is known as ____________.

Answer»

The process of granting access privileges to a user/program is known as ____________.
Choose the correct option from below LIST
(1)Authorization
(2)Identity MANAGEMENT
(3)Authentication

Answer:-(1)Authorization

7.

Admin accounts created in the master realm have permissions to view and manage any other realm created on the server instance.

Answer»

Admin accounts CREATED in the MASTER realm have PERMISSIONS to view and manage any other realm created on the server instance.
Choose the correct OPTION from below list
(1)True
(2)False

Answer:-(1)True

8.

Master realms are usually reserved for super administrators for creating and managing the realms in a system.

Answer»

Master realms are usually RESERVED for super administrators for creating and managing the realms in a system.
Choose the CORRECT OPTION from below list
(1)True
(2)False

Answer:-(1)True

9.

SAML 2.0 works by exchanging ___________ between the application and the authentication server.

Answer»

SAML 2.0 works by EXCHANGING ___________ between the application and the AUTHENTICATION server.
Choose the correct option from below list
(1)Authorization Tokens
(2)XML DOCUMENTS
(3)Authentication Tokens
(4)HTML Documents

Answer:-(2)XML Documents

10.

OIDC is a bit more verbose than SAML.

Answer»

OIDC is a bit more VERBOSE than SAML.
Choose the CORRECT option from below LIST
(1)True
(2)False

Answer:-(2)False

11.

____________ identify/identifies the type or category of a user.

Answer»

____________ identify/identifies the type or category of a user.
Choose the correct option from below list
(1)Roles
(2)Tokens
(3)IDENTITY
(4)Realm

Answer:-(1)Roles

12.

The ________________ feature allows users to be authenticated only once and yet access multiple applications without the need for reauthentication.

Answer»

The ________________ feature allows users to be authenticated only once and yet ACCESS multiple applications without the need for reauthentication.
Choose the correct option from below list
(1)Single Sign On
(2)IDENTITY MANAGEMENT
(3)Two-factor authentication
(4)Access Management

Answer:-(1)Single Sign On

13.

What is the highest level in the hierarchy of realms?

Answer»

What is the HIGHEST level in the hierarchy of REALMS?
Choose the correct option from below list
(1)admin realm
(2)User realm
(3)Root realm
(4)Master realm

Answer:-(4)Master realm

14.

Keycloak is an Identity Provider (IDP).

Answer»

Keycloak is an IDENTITY PROVIDER (IDP)
Choose the correct option from below list
(1)TRUE
(2)False

Answer:-(1)True

15.

Which among the following protocols has its roots in SOAP and WS-Specifications?

Answer»

Which among the following protocols has its ROOTS in SOAP and WS-Specifications?
Choose the correct option from below LIST
(1)SAML 2.0
(2)OpenID CONNECT
(3)Oauth 2.0

Answer:-(1)SAML 2.0

16.

Which of the following standard protocols does Keycloak Support?

Answer»

Which of the FOLLOWING standard protocols does Keycloak Support?
Choose the correct option from below list
(1)Oauth 2.0
(2)SAML
(3)OpenID Connect
(4)NONE of the OPTIONS
(5)All the options

Answer:-(5)All the options

17.

Identity Management and Identity Access Management are two different disciplines.

Answer» IDENTITY MANAGEMENT and Identity Access Management are two different disciplines.
Choose the correct option from below LIST
(1)FALSE
(2)True

Answer:-(1)False
18.

Keycloak can only be used to authenticate applications and not individual users.

Answer»

Keycloak can only be used to authenticate APPLICATIONS and not INDIVIDUAL users
Choose the correct OPTION from below LIST
(1)TRUE
(2)False

Answer:-(2)False

19.

A/An ____________ role can be associated with other roles.

Answer»

A/An ____________ role can be ASSOCIATED with other roles.
Choose the correct option from below LIST
(1)DEFAULT
(2)Member
(3)Admin
(4)Composite

Answer:-(4)Composite

20.

A user can be allocated to only one role.

Answer»

A user can be allocated to only ONE role.
Choose the CORRECT option from below list
(1)TRUE
(2)False

Answer:-(2)False

21.

Verifying the identity of an entity to allow access to a resource is known as __________.

Answer»

Verifying the IDENTITY of an entity to allow ACCESS to a RESOURCE is known as __________.
CHOOSE the correct option from below list
(1)Authentication
(2)Authorization
(3)Identity Management

Answer:-(1)Authentication

22.

Keycloak offers fine-grained authorization services.

Answer»

Keycloak OFFERS fine-grained AUTHORIZATION services.
Choose the correct OPTION from below list
(1)False
(2)True

Answer:-(2)True

23.

________ XML blob is included in a SAML authentication response that provides identity metadata about an authenticated user.

Answer»

________ XML blob is INCLUDED in a SAML AUTHENTICATION response that provides identity METADATA about an authenticated user.
Choose the correct option from below list
(1)Access TOKEN
(2)Client Scope
(3)Assertion
(4)Identity token

Answer:-(3)Assertion

24.

________ protocol is more suited to work with HTML5/Javascript applications due to ease of implementation.

Answer»

________ protocol is more suited to WORK with HTML5/Javascript applications due to ease of implementation.
Choose the CORRECT option from below list
(1)SAML
(2)OPENID Connect

Answer:-(2)OpenID Connect

25.

A/An ________ token contains information about user role mapping.

Answer»

A/An ________ token contains information about user role mapping.
Choose the CORRECT option from below list
(1)ACCESS
(2)Identity
(3)User
(4)Utility

Answer:-(1)Access

26.

The ________ contains information about the user, such as username and email.

Answer»

The ________ contains INFORMATION about the user, such as USERNAME and email.
Choose the correct OPTION from below LIST
(1)Utility token
(2)Access token
(3)Identity token
(4)Asset token

Answer:-(3)Identity token

27.

Which among the following is the full-fledged authentication and authorization protocol?

Answer»

Which among the following is the full-fledged AUTHENTICATION and AUTHORIZATION protocol?
Choose the correct option from below list
(1)OAUTH 2.0
(2)OpenID Connect

Answer:-(2)OpenID Connect