Exam 23: Internet Authentication Applications

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

An integer value unique within the issuing CA that is unambiguously associated with the certificate is the ________.

(Multiple Choice)
5.0/5
(39)

Kerberos does not support interrealm authentication.

(True/False)
4.8/5
(37)

The overall scheme of Kerberos is that of a trusted third-party authentication service.

(True/False)
4.8/5
(33)

The focus of _________ is defining an identity for each user,associating attributes with the identity,and enforcing a means by which a user can verify identity.

(Short Answer)
4.8/5
(35)

The authentication server shares a unique secret key with each server.

(True/False)
4.9/5
(29)

________ requires that a user prove his or her identity for each service invoked and,optionally,requires servers to prove their identity to clients.

(Multiple Choice)
4.8/5
(27)

The certification _________ is the issuer of certificates and certificate revocation lists.

(Short Answer)
4.9/5
(37)

The principal objective for developing a PKI is to enable secure, convenient,and efficient acquisition of private keys.

(True/False)
4.9/5
(27)

Federated identity management makes use of a number of standards that provide the building blocks for secure identity information exchange across different domains or heterogeneous systems.

(True/False)
4.8/5
(31)

_______ is movement of data in a business process.

(Multiple Choice)
4.8/5
(39)

In a generic identity management architecture _______ are entities that obtain and employ data maintained and provided by identity and attribute providers,often to support authorization decisions and to collect audit information.

(Short Answer)
4.8/5
(38)

A software utility initially developed at MIT and available both in the public domain and in commercially supported versions,________ is the defacto standard for remote authentication.

(Short Answer)
4.7/5
(37)

Kerberos uses the _______ encryption algorithm.

(Multiple Choice)
4.7/5
(26)

The approach taken by Kerberos is using authentication software tied to a secure authentication server.

(True/False)
4.9/5
(27)

_______ is a minimal set of conventions for invoking code using XML over HTTP that enables applications to request services from one another with XML-based requests and receive responses as data formatted with XML.

(Multiple Choice)
4.9/5
(27)

One of the earliest and most widely used services is _________.

(Multiple Choice)
5.0/5
(36)

________ is a process where authentication and permission will be passed on from one system to another,usually across multiple enterprises,reducing the number of authentications needed by the user.

(Multiple Choice)
4.8/5
(30)

______ is the set of hardware,software,people,policies,and procedures needed to create,manage,store,distribute,and revoke digital certificates based on asymmetric cryptography.

(Short Answer)
4.9/5
(37)

_______ is an XML-based language for the exchange of security information between online business partners.

(Short Answer)
4.8/5
(44)

In a generic identity management architecture a ________ is an identity holder.

(Short Answer)
4.8/5
(33)
Showing 21 - 40 of 45
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)