Multiple measures to verify user identity?

Prepare for the Certified Identity and Access Manager Exam using flashcards and multiple-choice questions. Gain insights into the exam format, practice with real-world scenarios, and ensure your success in becoming a certified professional.

Multiple Choice

Multiple measures to verify user identity?

Explanation:
Layered security in IAM emphasizes using multiple, complementary controls to verify a user’s identity rather than relying on a single factor. In practice, this means combining factors (something you know, something you have, something you are) with contextual signals like device health, location, and risk level, plus adaptive or continuous authentication. This approach strengthens assurance by requiring additional checks if risk prompts arise, such as MFA prompts, biometric verification, or hardware security keys, at various points in the access process. The other options focus on monitoring after access starts (activity monitoring), a single authentication stage (user authentication layer), or the permissions governing access (access control layer), none of which inherently address layering multiple identity verification measures. Therefore, layered security in IAM best captures the idea of multiple measures to verify identity.

Layered security in IAM emphasizes using multiple, complementary controls to verify a user’s identity rather than relying on a single factor. In practice, this means combining factors (something you know, something you have, something you are) with contextual signals like device health, location, and risk level, plus adaptive or continuous authentication. This approach strengthens assurance by requiring additional checks if risk prompts arise, such as MFA prompts, biometric verification, or hardware security keys, at various points in the access process. The other options focus on monitoring after access starts (activity monitoring), a single authentication stage (user authentication layer), or the permissions governing access (access control layer), none of which inherently address layering multiple identity verification measures. Therefore, layered security in IAM best captures the idea of multiple measures to verify identity.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy