Exam 16: User Authentication
Exam 1: Computer and Network Security Concepts45 Questions
Exam 2: Introduction to Number Theory13 Questions
Exam 3: Classical Encryption Techniques45 Questions
Exam 6: Advanced Encryption Standard45 Questions
Exam 7: Block Cipher Operation45 Questions
Exam 8: Random Bit Generation and Stream Ciphers45 Questions
Exam 9: Public-Key Cryptography and Rsa45 Questions
Exam 10: Other Public-Key Cryptosystems45 Questions
Exam 11: Cryptographic Hash Functions45 Questions
Exam 12: Message Authentication Codes45 Questions
Exam 13: Digital Signatures45 Questions
Exam 14: Lightweight Cryptography and Post-Quantum Cryptography45 Questions
Exam 15: Cryptographic Key Management and Distribution45 Questions
Exam 16: User Authentication45 Questions
Exam 18: Wireless Network Security45 Questions
Exam 19: Electronic Mail Security45 Questions
Exam 20: Ip Security44 Questions
Exam 21: Network Endpoint Security45 Questions
Exam 22: Cloud Security44 Questions
Exam 23: Internet of Things Iot Security45 Questions
Select questions type
the __________ is an entity that verifies the claimant's identity by verifying the claimant's possession and control of one or two authenticators using an authentication protocol.
(Short Answer)
4.9/5
(36)
One way to counter suppress-replay attacks is to enforce the
requirement that parties regularly check their clocks against the KDC's clock.
(True/False)
4.8/5
(42)
A __________ is a random value to be repeated in a message to assure that the response is fresh and has not been replayed by an opponent.
(Short Answer)
4.7/5
(40)
SSO enables a user to access all network resources after a single
authentication.
(True/False)
4.9/5
(35)
the simplest replay attack is one in which the opponent simply
copies a message and replays it later.
(True/False)
4.9/5
(43)
the credential service provider is a trusted entity that issues or
registers subscriber authenticators.
(True/False)
5.0/5
(47)
User __________ is the process of determining whether some user or some application or process acting on behalf of a user is, in fact, who or what it declares itself to be.
(Short Answer)
4.7/5
(37)
__________ is an extension of identity management to multiple security domains such as autonomous internal business units, external business partners and other third party applications and services with the goal of sharing digital identities so that a user can be authenticated a single time and then access applications and resources across multiple domains.
(Multiple Choice)
4.8/5
(38)
____________ technology provides access control for systems by checking to see if a user's credentials match the credentials in a database of authorized users or in a data authentication server.
(Multiple Choice)
4.9/5
(36)
____________ authentication involves a single transfer of information from one user (A) intended for another (B).
(Short Answer)
4.8/5
(40)
__________ are items that connect to a computer logically or physically in order to authenticate identity.
(Short Answer)
4.9/5
(36)
__________ assign attributes to users, such as roles, access permissions, and employee information.
(Multiple Choice)
4.8/5
(43)
A subject undergoing the processes of enrollment and identity proofing is the __________ .
(Multiple Choice)
4.9/5
(33)
there are a variety of problems including dealing with false
positives and false negatives, user acceptance, cost, and
convenience with respect to biometric authenticators.
(True/False)
5.0/5
(40)
Multifactor authentication is generally no more secure than single
factor authentication.
(True/False)
4.9/5
(32)
An entity that relies upon the subscriber's authenticator(s) and credentials or a verifier's assertion of a claimant's identity, typically to process a transaction or grant access to information or a system is the __________ .
(Multiple Choice)
5.0/5
(33)
the __________ is a data structure that authoritatively binds an identity and additional attributes to one or more authenticators possessed by a subscriber, and can be verified when presented to the verifier in an authentication transaction.
(Short Answer)
4.9/5
(37)
the clocks among the various participants are not required to be
synchronized when using the timestamp approach.
(True/False)
4.8/5
(41)
Identity federation is in essence an extension of identity
management to multiple security domains.
(True/False)
4.8/5
(38)
Showing 21 - 40 of 45
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)