Copyright

Identity, Credential, and Access Management (ICAM) in Cloud Computing

Instructions:

Choose an answer and hit 'next'. You will receive your score and answers at the end.

question 1 of 3

Which if the following statements is true regarding cloud computing service providers?

Create Your Account To Take This Quiz

As a member, you'll also get unlimited access to over 79,000 lessons in math, English, science, history, and more. Plus, get practice tests, quizzes, and personalized coaching to help you succeed.

Try it risk-free
Try it risk-free for 30 days. Cancel anytime
Already registered? Log in here for access

1. _____ is the concept that disucsses how an enterprise integrates with a cloud computing service provider.

2. Which of the following is NOT something a user would need to provide in order to prove their identity?

Create your account to access this entire worksheet
A Premium account gives you access to all lesson, practice exams, quizzes & worksheets
Access to all video lessons
Quizzes, practice exams & worksheets
Certificate of Completion
Access to instructors
Create an account to get started Create Account

About This Quiz & Worksheet

These quiz and worksheet questions test you on Identity, Credential and Access Management (ICAM) in cloud computing, such as what a user provides to prove their identity. You can take the quiz multiple times to make sure you understand the concepts covered.

Quiz & Worksheet Goals

This quiz will test you on the following:

  • True statements about cloud computing service providers
  • Integration of an enterprise with a cloud computing service provider
  • How a user proves their identity
  • Control of an enterprise's files and applications
  • What aspect of ICAM can have different formats

Skills Practiced

  • Information recall - access the knowledge you've gained about cloud computing service providers
  • Interpreting information - verify that you can read information about how an enterprise's files and applications are controlled and interpret it correctly
  • Knowledge application - use your knowledge to answer a question about the concept pertaining to how an enterprise integrates with a cloud computing service provider

Additional Learning

Learn even more about this subject with the lesson titled Identity, Credential, and Access Management (ICAM) in Cloud Computing. Here's a quick look at topics in this lesson:

  • Authentication in cloud computing
  • An example of identity correlation
  • Eliminating the need for multiple identities
  • Different types of credentials
Support