Exam 7: Authentication and Authorization With Java

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The ____ PAM module retrieves and makes available Unix UID/GID/groups information for the current user.

(Multiple Choice)
4.8/5
(36)

Regarding JAAS, the term ____ is used to represent a name associated with a subject.

(Multiple Choice)
4.9/5
(40)

The ____ class retrieves realm information for SaslClient and SaslServer.

(Multiple Choice)
4.8/5
(27)

What are some of the levels that can be set to specify the impact of the success or failure of a given log-in procedure on the overall JAAS authentication procedure?

(Essay)
4.9/5
(33)

In Java, the ____ class does this comparison. It programmatically checks permissions and obtains the current Subject associated with the active access control context as well.

(Multiple Choice)
4.8/5
(37)

To log all user roles and trace who, when, and what actions an entity performs, ____ is usually implemented with authentication and authorization.

(Multiple Choice)
4.9/5
(42)

The ____ class is used by SaslServer to determine whether or not one entity can act on behalf of another entity in the SASL environment.

(Multiple Choice)
4.8/5
(34)

The Java security architecture itself has the ability to enforce authentication, or determining who runs the code, and authorization or determining what actions can be performed.

(True/False)
4.8/5
(36)

The Java platform implements the concept of ____ to support thread execution across multiple modules with different context characteristics.

(Multiple Choice)
4.8/5
(36)

With ____, authorization is implemented when you control permissions for new objects created in a container object by setting inheritable permissions on the container.

(Multiple Choice)
4.8/5
(36)

____________________ is the assurance that an entity is who it claims to be.

(Short Answer)
4.8/5
(40)

The ____ class represents a Java implementation of the PAM framework.

(Multiple Choice)
4.7/5
(32)

____ enables authorization to be self-managed as an object owner can set permissions on all objects she or he created.

(Multiple Choice)
4.8/5
(36)

A Subject can also own security-related attributes. These attributes are called ____________________ in JAAS.

(Short Answer)
4.9/5
(32)

PAM modules cannot be stacked together to support "stacked authentication" where an application can use one or more PAM modules for authentication.

(True/False)
4.8/5
(26)

Briefly describe the Destroyable interface.

(Essay)
4.8/5
(28)

In Java, a(n) ____ is used to make system resource access decisions based on the context it encapsulates.

(Multiple Choice)
4.9/5
(34)

Briefly describe the java.security.policy class.

(Essay)
4.9/5
(34)

The idea of ____ is that all security contexts are linked to a user instead of an application.

(Multiple Choice)
4.9/5
(35)

To support stacked authentication, each PAM module, using the LoginModule interface, supports the notion of two-phase authentication using the login() and ____ method.

(Multiple Choice)
4.9/5
(37)
Showing 21 - 40 of 42
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)