Exam 7: Authentication and Authorization With Java
Exam 1: Introduction to Security Concepts42 Questions
Exam 2: Software Engineering and Security42 Questions
Exam 3: Essential Public Key Infrastructure42 Questions
Exam 4: Trust and Threat Model42 Questions
Exam 5: Java Programming Security42 Questions
Exam 6: Java Api-Level Security Features42 Questions
Exam 7: Authentication and Authorization With Java42 Questions
Exam 8: Secure Programming With C and Openssl42 Questions
Exam 9: Secure Programming With Perl42 Questions
Exam 10: Identity Management42 Questions
Exam 11: Security Topics42 Questions
Select questions type
Compare one-factor and multiple-factor authentication.
Free
(Essay)
4.9/5
(33)
Correct Answer:
Authentication techniques range from a one-factor simple log-on action. This action identifies users based on something that only the user knows such as a password. A multiple-factor authentication may additionally require something that the user has, such as public key certificates, biometrics, and secure hardware tokens.
Match each item with a statement below:
Correct Answer:
Premises:
Responses:
Free
(Matching)
4.9/5
(34)
Correct Answer:
Authentication in JAAS is performed in a pluggable and stackable fashion. It is based on a concept called the ___________________ framework.
Free
(Short Answer)
4.7/5
(30)
Correct Answer:
PAM (pluggable authentication module),PAM,pluggable authentication module,pluggable authentication module (PAM)
____ authentication is usually used with lightweight directory access protocol (LDAP) and Web authentication that transmits credentials across the network as an MD5 hash or message digest.
(Multiple Choice)
4.8/5
(37)
What are some of the benefits of using pluggable authentication modules?
(Essay)
4.8/5
(33)
The ____ PAM module provides a JAAS login module that prompts for a keystore alias and populates the subject with the alias's principal and credentials.
(Multiple Choice)
4.8/5
(39)
What are the general steps performed when authenticating a Subject in JAAS?
(Essay)
4.8/5
(43)
Java 2 provides access controls based on where the code originated from and who signed the code.
(True/False)
5.0/5
(32)
____________________ is concerned with what an identity is allowed to do.
(Short Answer)
4.9/5
(34)
The JAAS framework defines the term ____ to represent the requester for a service.
(Multiple Choice)
4.9/5
(35)
A good authentication technology should be platform and system dependent.
(True/False)
4.8/5
(46)
With ____, authorization is implemented by allowing the administrator to control which users or groups have the right to perform various administrative functions or to take any action that affects systemwide resources.
(Multiple Choice)
4.7/5
(37)
Does a "good" authentication technology that is platform/system independent and provides SSO exist today? Explain your answer.
(Essay)
4.8/5
(36)
____________________ is a list attached to an object in a system. It consists of control expressions, each of which grants or denies some ability to a particular user or group of users.
(Short Answer)
4.8/5
(33)
The ____ PAM module prompts for a username and password. It then verifies the password against the password stored in a directory service configured using Java naming and directory interface (JNDI).
(Multiple Choice)
4.8/5
(38)
____ authentication is an industry standard documented under RFC 1510 that is used with either a password or a smart card for interactive log on.
(Multiple Choice)
4.8/5
(41)
The ____ PAM module retrieves and makes available Solaris UID/GID/groups information for the current user.
(Multiple Choice)
4.8/5
(35)
Showing 1 - 20 of 42
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)