Master authentication factors, access control models, identity protocols (Kerberos, RADIUS, TACACS+), and federation standards (SAML, OAuth, OIDC) β with scenario-based quizzes and an IAM selector tool built for SY0-701.
π― Take the Practice QuizAuthentication and access control appear across Domains 1 and 4 of SY0-701. Questions test your ability to identify the right authentication mechanism for a scenario and choose the correct access control model based on organizational requirements.
Authentication factors prove who you are. MFA requires two or more different factor categories β combining them makes account compromise dramatically harder.
Access control models define who can access what. The right model depends on security requirements, flexibility needs, and organizational structure.
The protocols that carry authentication and authorization over the network. Each has specific use cases β the exam tests which protocol fits which scenario.
SSO and federation let users authenticate once and access multiple systems. The specific standard used depends on the architecture and application type.
Know the purpose of each model and protocol, not just its name. The exam presents scenarios and asks which control fits β RBAC vs. ABAC, RADIUS vs. TACACS+, SAML vs. OAuth. The wrong answer usually fails one specific requirement in the scenario.
The mechanisms, protocols, models, and exam traps for each authentication and access control category in SY0-701.
Filter by category or view all. Focus on the distinguishing features that determine the right control for each scenario.
| Criterion | π Auth/MFA | ποΈ Access Control | ποΈ Protocols | π€ SSO/Federation |
|---|---|---|---|---|
| Core Question | Who are you? (identity verification) | What can you access? (authorization) | How is auth/authz transmitted? (AAA protocol) | Can you use your existing identity here? (trust) |
| Key Models | Know / Have / Are / Location / Behavior + MFA | DAC / MAC / RBAC / ABAC / Rule-Based | Kerberos / RADIUS / TACACS+ / LDAP / NTLM | SAML 2.0 / OAuth 2.0 / OIDC / Federation |
| Most Flexible | FIDO2/Passkeys β phishing-resistant, no password | ABAC β policies combine multiple attributes | TACACS+ β separates A/A/A independently | OIDC β modern, API-friendly, mobile-compatible |
| Government / High Security | Smart card (PIV/CAC) β possession + knowledge | MAC β labels and clearances, SELinux | Kerberos β mutual auth, no password on wire | SAML 2.0 β mature, widely audited standard |
| Key Limitation | Biometrics: FAR/FRR trade-off; TOTP: phishable; SMS OTP: SIM-swap vulnerable | DAC: users over-share; MAC: rigid; RBAC: role explosion; ABAC: complex policies | RADIUS: UDP (unreliable), password-only encryption; Kerberos: requires time sync | SAML: XML complexity; OAuth: not for authentication; SSO: IdP = single point of failure |
| Exam Keyword | "Phishing-resistant" = FIDO2 Β· "30-sec code" = TOTP Β· "CER/FAR/FRR" = Biometrics | "Labels/clearances" = MAC Β· "Roles" = RBAC Β· "Multiple attributes" = ABAC Β· "Owner sets" = DAC | "VPN/Wi-Fi AAA" = RADIUS Β· "Command-level, full encrypt" = TACACS+ Β· "Tickets, AD" = Kerberos | "Enterprise SSO, XML" = SAML Β· "Authorization, not authn" = OAuth Β· "Sign in with Google" = OIDC |
| Typical Use Case | Login flows, remote access, VPN, privileged admin access | File system permissions, cloud IAM policies, database access control | Enterprise networks, Windows domains, VPN gateways, managed switches/routers | Enterprise SaaS apps, cross-org partner access, mobile/API authentication |
Read each scenario and identify the correct IAM answer before checking the breakdown.
10 scenario-based questions with per-category breakdown β built around actual SY0-701 scenario question patterns.
Answer 2β3 questions to identify the most appropriate identity and access management control for your scenario.
Click each card to flip it and reveal the mnemonic.
π Tap a card to flip
| If the exam says⦠| Key detail | Answer |
|---|---|---|
| "Phishing-resistant MFA," "TOTP captured in real-time attack" | Tied to origin domain cryptographically | FIDO2 / WebAuthn / Passkeys |
| "30-second code," "authenticator app" | Time-based, expires quickly | TOTP |
| "FAR/FRR crossover point" | Where FAR = FRR β system accuracy metric | CER (Crossover Error Rate) |
| "Federal ID card + PIN," "DoD," "PIV" | Possession + knowledge | Smart Card (PIV/CAC) |
| "Owner controls access," "NTFS permissions," "ACL" | User-discretionary | DAC |
| "Security labels," "clearance levels," "government/military" | System-enforced, SELinux | MAC |
| "No Read Up, No Write Down" | Confidentiality-focused MAC | Bell-LaPadula Model |
| "Job roles," "enterprise," "role explosion," "least privilege" | Role-centric | RBAC |
| "Time of day + department + device type + role" | Multi-attribute policies | ABAC |
| "VPN auth," "Wi-Fi authentication," "AAA for network access," "UDP" | Password-only encrypted | RADIUS |
| "Router admin," "command-level authorization," "full encryption," "TCP 49" | Separates A/A/A | TACACS+ |
| "Tickets," "TGT," "Windows AD," "KDC," "mutual auth" | Port 88, no password on wire | Kerberos |
| "Enterprise SSO," "XML assertion," "IdP + SP," "Salesforce/Workday" | Browser-based, mature standard | SAML 2.0 |
| "Sign in with Google/Apple," "ID token," "JSON" | Authentication on top of OAuth | OpenID Connect (OIDC) |
| "App accesses calendar/contacts without your password" | Authorization only, not auth | OAuth 2.0 |