Q.1 What does IAM stand for in cloud computing?
Identity and Access Management
Internet Access Module
Internal Application Monitoring
Information and Analytics Management
Explanation - IAM stands for Identity and Access Management, a framework for controlling user access to cloud resources.
Correct answer is: Identity and Access Management
Q.2 Which of the following is the primary purpose of IAM?
To store user data
To manage permissions and identities
To increase internet speed
To backup files
Explanation - IAM is designed to authenticate and authorize users, ensuring they have appropriate access levels to resources.
Correct answer is: To manage permissions and identities
Q.3 Which cloud provider offers IAM as a built-in feature?
AWS
Google Cloud
Microsoft Azure
All of the above
Explanation - All major cloud providers such as AWS, Google Cloud, and Azure provide IAM services.
Correct answer is: All of the above
Q.4 In IAM, what does authentication verify?
What the user can access
Who the user is
How much storage is used
When the user logged in
Explanation - Authentication ensures that the identity of a user is correctly verified, usually through passwords, keys, or biometrics.
Correct answer is: Who the user is
Q.5 In IAM, what does authorization determine?
Who the user is
What resources the user can access
The user's location
The password strength
Explanation - Authorization defines the permissions and roles a user has after being authenticated.
Correct answer is: What resources the user can access
Q.6 Which IAM concept allows grouping users with similar permissions?
Roles
Keys
Buckets
Regions
Explanation - Roles are used in IAM to assign specific permissions that can be granted to multiple users or services.
Correct answer is: Roles
Q.7 What is the benefit of least privilege in IAM?
Maximizes access to resources
Minimizes security risks
Improves storage speed
Increases cost efficiency
Explanation - Least privilege ensures users get only the permissions they need, reducing the attack surface.
Correct answer is: Minimizes security risks
Q.8 Which protocol is commonly used in IAM for single sign-on (SSO)?
HTTP
SAML
SMTP
FTP
Explanation - SAML (Security Assertion Markup Language) is widely used for enabling single sign-on across systems.
Correct answer is: SAML
Q.9 In AWS IAM, what is a policy?
A set of rules defining access permissions
A backup strategy
A database schema
A monitoring tool
Explanation - IAM policies are JSON documents defining what actions are allowed or denied for specific resources.
Correct answer is: A set of rules defining access permissions
Q.10 What is MFA in the context of IAM?
Multiple Firewall Access
Multi-Factor Authentication
Managed File Application
Multi-Functional API
Explanation - MFA adds an additional layer of security by requiring two or more forms of verification.
Correct answer is: Multi-Factor Authentication
Q.11 Which of the following best describes federated identity?
A user with multiple cloud accounts
A single identity used across multiple platforms
An admin role in cloud IAM
A duplicate IAM role
Explanation - Federated identity allows users to authenticate with a single identity across multiple platforms or organizations.
Correct answer is: A single identity used across multiple platforms
Q.12 What is the default status of new IAM users in AWS?
They have full access
They have no permissions
They can only access billing
They are admins by default
Explanation - By default, new IAM users in AWS do not have permissions until explicitly granted via policies.
Correct answer is: They have no permissions
Q.13 Which standard is commonly used for OAuth 2.0 in IAM?
Authorization framework
Storage management system
Database query language
Cloud monitoring tool
Explanation - OAuth 2.0 is an authorization framework commonly used in IAM to delegate access without sharing credentials.
Correct answer is: Authorization framework
Q.14 What is a service account in IAM?
An account for billing
A non-human account for applications/services
An account for root admin only
An account for guest users
Explanation - Service accounts allow applications or services to interact with cloud resources securely.
Correct answer is: A non-human account for applications/services
Q.15 What is the main risk of not implementing IAM properly?
Data redundancy
Unauthorized access
High cloud bills
Slow performance
Explanation - Without proper IAM, attackers or unauthorized users may gain access to sensitive resources.
Correct answer is: Unauthorized access
Q.16 Which of these is an example of an IAM best practice?
Use the root account for daily tasks
Enable MFA
Give all users admin rights
Disable password policies
Explanation - Enabling Multi-Factor Authentication is a widely recommended IAM best practice.
Correct answer is: Enable MFA
Q.17 Which IAM feature helps in auditing user activity?
Access keys
IAM logs
Virtual machines
Cloud storage
Explanation - IAM logs track authentication and authorization activities, enabling audits and compliance.
Correct answer is: IAM logs
Q.18 What type of IAM policy is directly attached to a user?
Inline policy
Group policy
Service policy
Role policy
Explanation - Inline policies are directly attached to a user, role, or group for specific permissions.
Correct answer is: Inline policy
Q.19 Which AWS entity has unrestricted access by default?
IAM User
IAM Role
Root Account
IAM Group
Explanation - The root account has full access to all AWS resources and should be used carefully.
Correct answer is: Root Account
Q.20 In Google Cloud IAM, what is a binding?
A database lock
An association between a member and a role
A VM scheduling policy
A backup operation
Explanation - In GCP IAM, a binding connects members (users, groups, service accounts) with roles.
Correct answer is: An association between a member and a role
Q.21 Which of the following is NOT an authentication factor?
Password
Fingerprint
One-time PIN
Cloud region
Explanation - Authentication factors include something you know (password), have (token), or are (biometrics). Cloud region is unrelated.
Correct answer is: Cloud region
Q.22 Why are IAM groups useful?
They reduce storage costs
They simplify permission management
They encrypt data
They manage billing
Explanation - Groups allow applying permissions to many users at once, simplifying administration.
Correct answer is: They simplify permission management
Q.23 Which of these is a temporary set of permissions in IAM?
Static keys
IAM role
Root account
Permanent access
Explanation - Roles provide temporary credentials for users or services to perform specific actions.
Correct answer is: IAM role
Q.24 What does the principle of separation of duties mean in IAM?
One user should have all permissions
Split responsibilities among multiple users
Restrict access to all users
Use a single account for all tasks
Explanation - Separation of duties prevents fraud and misuse by dividing responsibilities among multiple accounts.
Correct answer is: Split responsibilities among multiple users
Q.25 Which IAM model is most commonly used in cloud services?
Role-Based Access Control
Discretionary Access Control
Mandatory Access Control
Token-Based Encryption
Explanation - RBAC is widely used in cloud IAM for assigning roles with predefined permissions to users.
Correct answer is: Role-Based Access Control
