Exam 23: Internet Authentication Applications

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

In Kerberos,the ___________ decrypts the ticket and authenticator,verifies the request,and creates ticket for requested server.

Free
(Short Answer)
4.9/5
(38)
Correct Answer:
Verified

ticket granting server (TGS)

_______ is the process in which a CA issues a certificate for a user's public key and returns that certificate to the user's client system and/or posts that certificate in a repository.

Free
(Multiple Choice)
4.9/5
(39)
Correct Answer:
Verified

A

A full-service Kerberos environment consisting of a Kerberos server that has the user ID and password of all participating users in its database and shares a secret key with each server,all users and servers being registered with the Kerberos server,is referred to as a Kerberos ______.

Free
(Short Answer)
4.9/5
(39)
Correct Answer:
Verified

realm

_______ certificates are used in most network security applications,including IP security,secure sockets layer,secure electronic transactions,and S/MIME.

(Multiple Choice)
4.9/5
(36)

The _______ consists of two dates: the first and last on which the certificate is valid.

(Multiple Choice)
4.9/5
(40)

The ticket contains the user's ID,the server's ID,a __________,a lifetime after which the ticket is invalid,and a copy of the same session key sent in the outer message to the client.

(Short Answer)
4.7/5
(32)

Initialization begins the process of enrolling in a PKI.

(True/False)
4.8/5
(31)

_______ systems are automated methods of verifying or recognizing identity on the basis of some physiological or behavioral characteristic.

(Short Answer)
4.8/5
(27)

X.509 provides a format for use in revoking a key before it expires.

(True/False)
4.7/5
(33)

An obvious security risk is that of impersonation.

(True/False)
4.8/5
(34)

CMP,defined in RFC 2510,is designed to be a flexible protocol able to accommodate a variety of technical,operational,and business models.

(True/False)
4.8/5
(36)

Kerberos is designed to counter only one specific threat to the security of a client/server dialogue.

(True/False)
4.7/5
(33)

_______ is the process whereby a user first makes itself known to a CA prior to that CA issuing a certificate or certificates for that user.

(Multiple Choice)
4.9/5
(32)

Update is not required when the certificate lifetime expires or as a result of certificate revocation.

(True/False)
4.8/5
(45)

The ticket-granting ticket is not reusable.

(True/False)
4.7/5
(33)

A principal element of an identity management system is _______.

(Multiple Choice)
4.8/5
(25)

________ is a set of SOAP extensions for implementing message integrity and confidentiality in Web services.

(Short Answer)
4.7/5
(32)

The _________ is an optional bit string field used to identify uniquely the issuing CA in the event the X.500 name has been reused for different entities.

(Short Answer)
4.9/5
(33)

A _______ is a generic term used to denote any method for storing certificates and CRLs so that they can be retrieved by end entities.

(Multiple Choice)
5.0/5
(34)

Because serial numbers are unique within a CA,the serial number is sufficient to identify the certificate.

(True/False)
4.9/5
(38)
Showing 1 - 20 of 45
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)