Exam 16: User Authentication

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

the __________ is an entity that verifies the claimant's identity by verifying the claimant's possession and control of one or two authenticators using an authentication protocol.

(Short Answer)
4.9/5
(36)

One way to counter suppress-replay attacks is to enforce the requirement that parties regularly check their clocks against the KDC's clock.

(True/False)
4.8/5
(42)

A __________ is a random value to be repeated in a message to assure that the response is fresh and has not been replayed by an opponent.

(Short Answer)
4.7/5
(40)

SSO enables a user to access all network resources after a single authentication.

(True/False)
4.9/5
(35)

the simplest replay attack is one in which the opponent simply copies a message and replays it later.

(True/False)
4.9/5
(43)

the credential service provider is a trusted entity that issues or registers subscriber authenticators.

(True/False)
5.0/5
(47)

User __________ is the process of determining whether some user or some application or process acting on behalf of a user is, in fact, who or what it declares itself to be.

(Short Answer)
4.7/5
(37)

__________ is an extension of identity management to multiple security domains such as autonomous internal business units, external business partners and other third party applications and services with the goal of sharing digital identities so that a user can be authenticated a single time and then access applications and resources across multiple domains.

(Multiple Choice)
4.8/5
(38)

____________ technology provides access control for systems by checking to see if a user's credentials match the credentials in a database of authorized users or in a data authentication server.

(Multiple Choice)
4.9/5
(36)

____________ authentication involves a single transfer of information from one user (A) intended for another (B).

(Short Answer)
4.8/5
(40)

__________ are items that connect to a computer logically or physically in order to authenticate identity.

(Short Answer)
4.9/5
(36)

__________ assign attributes to users, such as roles, access permissions, and employee information.

(Multiple Choice)
4.8/5
(43)

A subject undergoing the processes of enrollment and identity proofing is the __________ .

(Multiple Choice)
4.9/5
(33)

Inherence factor is something the individual is or does.

(True/False)
4.9/5
(28)

there are a variety of problems including dealing with false positives and false negatives, user acceptance, cost, and convenience with respect to biometric authenticators.

(True/False)
5.0/5
(40)

Multifactor authentication is generally no more secure than single factor authentication.

(True/False)
4.9/5
(32)

An entity that relies upon the subscriber's authenticator(s) and credentials or a verifier's assertion of a claimant's identity, typically to process a transaction or grant access to information or a system is the __________ .

(Multiple Choice)
5.0/5
(33)

the __________ is a data structure that authoritatively binds an identity and additional attributes to one or more authenticators possessed by a subscriber, and can be verified when presented to the verifier in an authentication transaction.

(Short Answer)
4.9/5
(37)

the clocks among the various participants are not required to be synchronized when using the timestamp approach.

(True/False)
4.8/5
(41)

Identity federation is in essence an extension of identity management to multiple security domains.

(True/False)
4.8/5
(38)
Showing 21 - 40 of 45
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)