Exam 7: Authentication and Authorization With Java
Exam 1: Introduction to Security Concepts42 Questions
Exam 2: Software Engineering and Security42 Questions
Exam 3: Essential Public Key Infrastructure42 Questions
Exam 4: Trust and Threat Model42 Questions
Exam 5: Java Programming Security42 Questions
Exam 6: Java Api-Level Security Features42 Questions
Exam 7: Authentication and Authorization With Java42 Questions
Exam 8: Secure Programming With C and Openssl42 Questions
Exam 9: Secure Programming With Perl42 Questions
Exam 10: Identity Management42 Questions
Exam 11: Security Topics42 Questions
Select questions type
The ____ PAM module retrieves and makes available Unix UID/GID/groups information for the current user.
(Multiple Choice)
4.8/5
(36)
Regarding JAAS, the term ____ is used to represent a name associated with a subject.
(Multiple Choice)
4.9/5
(40)
The ____ class retrieves realm information for SaslClient and SaslServer.
(Multiple Choice)
4.8/5
(27)
What are some of the levels that can be set to specify the impact of the success or failure of a given log-in procedure on the overall JAAS authentication procedure?
(Essay)
4.9/5
(33)
In Java, the ____ class does this comparison. It programmatically checks permissions and obtains the current Subject associated with the active access control context as well.
(Multiple Choice)
4.8/5
(37)
To log all user roles and trace who, when, and what actions an entity performs, ____ is usually implemented with authentication and authorization.
(Multiple Choice)
4.9/5
(42)
The ____ class is used by SaslServer to determine whether or not one entity can act on behalf of another entity in the SASL environment.
(Multiple Choice)
4.8/5
(34)
The Java security architecture itself has the ability to enforce authentication, or determining who runs the code, and authorization or determining what actions can be performed.
(True/False)
4.8/5
(36)
The Java platform implements the concept of ____ to support thread execution across multiple modules with different context characteristics.
(Multiple Choice)
4.8/5
(36)
With ____, authorization is implemented when you control permissions for new objects created in a container object by setting inheritable permissions on the container.
(Multiple Choice)
4.8/5
(36)
____________________ is the assurance that an entity is who it claims to be.
(Short Answer)
4.8/5
(40)
The ____ class represents a Java implementation of the PAM framework.
(Multiple Choice)
4.7/5
(32)
____ enables authorization to be self-managed as an object owner can set permissions on all objects she or he created.
(Multiple Choice)
4.8/5
(36)
A Subject can also own security-related attributes. These attributes are called ____________________ in JAAS.
(Short Answer)
4.9/5
(32)
PAM modules cannot be stacked together to support "stacked authentication" where an application can use one or more PAM modules for authentication.
(True/False)
4.8/5
(26)
In Java, a(n) ____ is used to make system resource access decisions based on the context it encapsulates.
(Multiple Choice)
4.9/5
(34)
The idea of ____ is that all security contexts are linked to a user instead of an application.
(Multiple Choice)
4.9/5
(35)
To support stacked authentication, each PAM module, using the LoginModule interface, supports the notion of two-phase authentication using the login() and ____ method.
(Multiple Choice)
4.9/5
(37)
Showing 21 - 40 of 42
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)