Q.1 Which of the following standard protocols does Keycloak Support?
A. Oauth 2.0
B. OpenID Connect
C. SAML
D. All the options
Ans : All the options
Q.2 Which of the following is a benefit of Identity and Access Management?
A. Improves Security
B. Manages Risks
C. Meet Compliance goals
D. Reach business objectives
E. Improves Productivity
F. All the options
Ans : All the options
Q.3 A __________ defines the conditions that must be satisfied to grant access to an object.
A. Scope
B. Policy
C. Permission
Ans : Policy
Q.4 Keycloak is an Identity Provider (IDP).
A. True
B. False
Ans : True
Q.5 Keycloak can only be used to authenticate applications and not individual users.
A. True
B. False
Ans : False
Q.6 The feature of logging into social networks can be facilitated using Keycloak.
A. True
B. False
Ans : True
Q.7 Master realms are usually reserved for super administrators for creating and managing the realms in a system.
A. True
B. False
Ans : True
Q.8 Admin accounts created in the master realm have permissions to view and manage any other realm created on the server instance.
A. True
B. False
Ans : True
Q.9 A/An ________ token contains information about user role mapping.
A. Identity
B. Utility
C. User
D. Access
Ans : Access
Q.10 SAML 2.0 works by exchanging ___________ between the application and the authentication server.
A. Authentication Tokens
B. HTML Documents
C. XML Documents
D. Authorization Tokens
Ans : XML Documents
Q.11 What is the highest level in the hierarchy of realms?
A. User realm
B. admin realm
C. Master realm
D. Root realm
Ans : Master realm
Q.12 Verifying the identity of an entity to allow access to a resource is known as __________.
A. Identity Management
B. Authentication
C. Authorization
Ans : Authentication
Q.13 ____________ identify/identifies the type or category of a user.
A. Roles
B. Identity
C. Realm
D. Tokens
Ans : Roles
Q.14 A user can be allocated to only one role.
A. True
B. False
Ans : False
Q.15 ________ protocol is more suited to work with HTML5/Javascript applications due to ease of implementation.
A. SAML
B. OpenID Connect
Ans : OpenID Connect
Q.16 The ________ contains information about the user, such as username and email.
A. Utility token
B. Identity token
C. Access token
D. Asset token
Ans : Identity token
Q.17 Which among the following protocols has its roots in SOAP and WS-Specifications?
A. OpenID Connect
B. Oauth 2.0
C. SAML 2.0
Ans : SAML 2.0
Q.18 The process of granting access privileges to a user/program is known as ____________.
A. Authentication
B. Identity Management
C. Authorization
Ans : Authorization
Q.19 The entities that request Keycloak to authenticate a user are called as ____________.
A. Processes
B. Servers
C. Clients
Ans : Clients
Q.20 Which among the following is the full-fledged authentication and authorization protocol?
A. Oauth 2.0
B. OpenID Connect
Ans : OpenID Connect