Exam 16: User Authentication
Exam 1: Computer and Network Security Concepts45 Questions
Exam 2: Introduction to Number Theory13 Questions
Exam 3: Classical Encryption Techniques45 Questions
Exam 6: Advanced Encryption Standard45 Questions
Exam 7: Block Cipher Operation45 Questions
Exam 8: Random Bit Generation and Stream Ciphers45 Questions
Exam 9: Public-Key Cryptography and Rsa45 Questions
Exam 10: Other Public-Key Cryptosystems45 Questions
Exam 11: Cryptographic Hash Functions45 Questions
Exam 12: Message Authentication Codes45 Questions
Exam 13: Digital Signatures45 Questions
Exam 14: Lightweight Cryptography and Post-Quantum Cryptography45 Questions
Exam 15: Cryptographic Key Management and Distribution45 Questions
Exam 16: User Authentication45 Questions
Exam 18: Wireless Network Security45 Questions
Exam 19: Electronic Mail Security45 Questions
Exam 20: Ip Security44 Questions
Exam 21: Network Endpoint Security45 Questions
Exam 22: Cloud Security44 Questions
Exam 23: Internet of Things Iot Security45 Questions
Select questions type
Characteristics, called __________ , that are unique or almost unique to the individual, include fingerprint, voice, handwriting, and face.
Free
(Short Answer)
4.8/5
(39)
Correct Answer:
biometrics
A ticket is encrypted with a secret key known only to the
AS and the __________ .
Free
(Short Answer)
4.9/5
(37)
Correct Answer:
ticket-granting server (TGS)
the overall scheme of Kerberos is that of a trusted third party authentication service that uses a protocol based on a proposal by __________ .
Free
(Multiple Choice)
4.8/5
(31)
Correct Answer:
A
A Kerberos __________ is a set of managed nodes that share the same Kerberos database.
(Multiple Choice)
4.8/5
(39)
the __________ approach is unsuitable for a connectionless type of application because it requires the overhead of a handshake before any connectionless transmission, effectively negating the chief characteristic of a connectionless transaction.
(Multiple Choice)
4.8/5
(34)
A Kerberos _____ is a set of managed nodes that share the same Kerberos database.
(Short Answer)
4.7/5
(31)
In order to convince a server that a user is authentic, the authentication server creates a __________ that is encrypted using the secret key shared by the AS and that server that contains the user's ID and network address and the server's ID.
(Short Answer)
4.8/5
(27)
the __________ is unsuitable for a connectionless type of application because it requires the overhead of a handshake before any connectionless transmission, effectively negating the chief characteristic of a connectionless transaction.
(Multiple Choice)
4.9/5
(31)
the specific items used during authentication, such as a password or hardware token, are referred to as __________ .
(Short Answer)
4.9/5
(32)
Subscriber is a subject whose identity is to be verified using one or
more authentication protocols.
(True/False)
4.7/5
(30)
there are four general means, or authentication factors, of
authenticating a user's identity, which can be used alone or in combination.
(True/False)
4.9/5
(32)
Examples of dynamic biometrics include recognition by fingerprint,
retina, and face.
(True/False)
4.8/5
(38)
________ is a procedure that allows communicating parties to verify that the contents of a received message have not been altered and that the source is authentic.
(Multiple Choice)
4.8/5
(29)
In an unprotected network environment any client can apply to any server for service.the obvious security risk of this is __________ .
(Multiple Choice)
5.0/5
(31)
A centralized, automated approach to provide enterprise-wide access to resources by employees and other authorized individuals with a focus of defining an identity for each user, associating attributes with the identity, and enforcing a means by which a user can verify identity is __________ .
(Multiple Choice)
4.7/5
(30)
the challenge-response approach is unsuitable for a
connectionless type of application beause it requires the overhead of a handshake before any connectionless transmission.
(True/False)
4.7/5
(22)
the authenticator that is used as a possession factor is a __________ .
(Multiple Choice)
4.8/5
(32)
_________ establishes that a subject is who they claim to be to a stated level of certitude.
(Multiple Choice)
4.8/5
(29)
Showing 1 - 20 of 45
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)