Access Management: Introduction and Process Activities by IT Training Zone

video locked

About the Lecture

The lecture Access Management: Introduction and Process Activities by IT Training Zone is from the course ITIL® OSA - Operational Support and Analysis . It contains the following chapters:

  • Lesson Contents
  • Purpose, Objectives
  • Policies
  • AM Process Flow
  • Exercise – Granting Access
  • Exercise – Identity
  • Removal of Access

Included Quiz Questions

  1. The process which grants access to authorised users
  2. The process of authorising access to data
  3. The process which defines security policies
  4. The process which decides what level of authorisation is required before access is granted
  1. Access Management is responsible for setting up new users and deleting them when the staff members leave
  2. It is the responsibility of the business to decide what access is appropriate
  3. Neither
  1. The classification of data
  2. The integrity of data
  3. The confidentiality of data
  4. The availability of data
  1. Rights define whether a user can read, write, change or delete data
  2. Privileges defines the level and extent of a service’s functionality that a user is entitled to use
  3. Neither
  1. Inexperienced staff being wrongly granted high levels of authority
  2. Staff under suspension for suspected abuse of access to systems being able to destroy evidence of their actions
  3. Data being hacked by unknown individuals
  4. Data being incorrectly classified
  1. Access Management monitors access for abuses
  2. Access Management decides when access should be revoked
  3. Neither
  1. Access Management must be provided with accurate information to enable it to adjust access rights when staff leave or move between departments
  2. Access Management investigates security breaches
  3. Neither
  1. Directory Services
  2. Directory Access
  3. Active Access
  4. Service Groups
  1. Verifying the identity of users requesting access to services
  2. Ensuring access granted keeps in step with users changing roles and responsibilities
  3. Deciding which rights or privileges should be granted to authorised users
  4. Defining security policies for system access
  1. Access Management would ensure that 3rd party access to data was in line with security policies
  2. Once Access Management has received the required authorisation and granted access, it has no interest in how the user uses that access
  3. Neither
  1. Receiving the request, verification, authorisation, provision, monitoring changing requirements, logging and tracking, removal and restriction of rights
  2. Receiving the request, authorisation, verification, provision, logging and tracking, monitoring changing requirements, removal and restriction of rights
  3. Receiving the request, provision, verification, authorisation, logging and tracking, removal and restriction of rights, monitoring changing requirements
  4. Monitoring changing requirement, receiving the request, provision, logging and tracking, verification, authorisation, removal and restriction of rights
  1. To allow 2 users to share the same identity
  2. To provide a user with access to data
  3. To change a user’s existing access to data
  4. To remove access to data that a user currently has
  1. The user’s line manager
  2. The Human Resources department
  3. The user themselves
  4. The Access Management process owner
  1. An access request may be received via the Service Desk
  2. Access requests may be recorded and authorised automatically
  3. Neither
  1. If the request is made through a secure website, that the user has signed onto using their password
  2. If the user provides correct answers to secret questions such as their mother’s maiden name
  3. If the user satisfies biometric tests
  4. If the user is vouched for by a verified and authorised person
  5. None of them
  1. If Human Resources confirm the change in role which requires a change in access
  2. If the organisation has a policy allowing access to the particular service on request
  3. If the user’s manager authorises the request
  4. If the request is confirmed by the user’s colleague
  1. Defining the appropriate access for specific roles is a technique used by Access Management to simplify and standardise the provision of access
  2. Where there is a “role conflict”, the role providing the greater access should be used
  3. Neither
  1. Promotions
  2. Departmental re-organisations
  3. Suspensions
  4. Resignations
  5. Long service awards
  1. An incident should be raised using a specific incident model, which is not easily visible to users of the incident system
  2. Evidence should be gathered and preserved
  3. Neither
  1. Access must ensure that records are kept of who accessed what services, or who attempted and failed to access it
  2. Access Management is responsible for investigating security breaches and taking action to close any loopholes
  3. Neither

Author of lecture Access Management: Introduction and Process Activities

 IT Training Zone

IT Training Zone


Customer reviews

(1)
5,0 of 5 stars
5 Stars
5
4 Stars
0
3 Stars
0
2 Stars
0
1  Star
0