Exam 16: User Authentication

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Characteristics, called __________ , that are unique or almost unique to the individual, include fingerprint, voice, handwriting, and face.

Free
(Short Answer)
4.8/5
(39)
Correct Answer:
Verified

biometrics

A ticket is encrypted with a secret key known only to the AS and the __________ .

Free
(Short Answer)
4.9/5
(37)
Correct Answer:
Verified

ticket-granting server (TGS)

the overall scheme of Kerberos is that of a trusted third party authentication service that uses a protocol based on a proposal by __________ .

Free
(Multiple Choice)
4.8/5
(31)
Correct Answer:
Verified

A

A Kerberos __________ is a set of managed nodes that share the same Kerberos database.

(Multiple Choice)
4.8/5
(39)

the __________ approach is unsuitable for a connectionless type of application because it requires the overhead of a handshake before any connectionless transmission, effectively negating the chief characteristic of a connectionless transaction.

(Multiple Choice)
4.8/5
(34)

A Kerberos _____ is a set of managed nodes that share the same Kerberos database.

(Short Answer)
4.7/5
(31)

In order to convince a server that a user is authentic, the authentication server creates a __________ that is encrypted using the secret key shared by the AS and that server that contains the user's ID and network address and the server's ID.

(Short Answer)
4.8/5
(27)

the __________ is unsuitable for a connectionless type of application because it requires the overhead of a handshake before any connectionless transmission, effectively negating the chief characteristic of a connectionless transaction.

(Multiple Choice)
4.9/5
(31)

the specific items used during authentication, such as a password or hardware token, are referred to as __________ .

(Short Answer)
4.9/5
(32)

Subscriber is a subject whose identity is to be verified using one or more authentication protocols.

(True/False)
4.7/5
(30)

there are four general means, or authentication factors, of authenticating a user's identity, which can be used alone or in combination.

(True/False)
4.9/5
(32)

Examples of dynamic biometrics include recognition by fingerprint, retina, and face.

(True/False)
4.8/5
(38)

________ is a procedure that allows communicating parties to verify that the contents of a received message have not been altered and that the source is authentic.

(Multiple Choice)
4.8/5
(29)

In an unprotected network environment any client can apply to any server for service.the obvious security risk of this is __________ .

(Multiple Choice)
5.0/5
(31)

A centralized, automated approach to provide enterprise-wide access to resources by employees and other authorized individuals with a focus of defining an identity for each user, associating attributes with the identity, and enforcing a means by which a user can verify identity is __________ .

(Multiple Choice)
4.7/5
(30)

Kerberos relies exclusively on __________ .

(Multiple Choice)
4.9/5
(38)

the challenge-response approach is unsuitable for a connectionless type of application beause it requires the overhead of a handshake before any connectionless transmission.

(True/False)
4.7/5
(22)

the authenticator that is used as a possession factor is a __________ .

(Multiple Choice)
4.8/5
(32)

Kerberos relies exclusively on symmetric encryption.

(True/False)
4.8/5
(35)

_________ establishes that a subject is who they claim to be to a stated level of certitude.

(Multiple Choice)
4.8/5
(29)
Showing 1 - 20 of 45
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)