Exam 23: Internet Authentication Applications
Exam 1: Computer Systems Overview45 Questions
Exam 2: Cryptographic Tools45 Questions
Exam 3: User Authentication45 Questions
Exam 4: Access Control45 Questions
Exam 5: Database and Cloud Security45 Questions
Exam 6: Malicious Software44 Questions
Exam 7: Denial-Of-Service Attacks45 Questions
Exam 8: Intrusion Detection45 Questions
Exam 9: Firewalls and Intrusion Prevention Systems45 Questions
Exam 10: Buffer Overflow44 Questions
Exam 11: Software Security43 Questions
Exam 12: Operating System Security45 Questions
Exam 13: Trusted Computing and Multilevel Security45 Questions
Exam 14: It Security Management and Risk Assessment45 Questions
Exam 15: It Security Controls,plans,and Procedures45 Questions
Exam 16: Physical and Infrastructure Security45 Questions
Exam 17: Human Resources Security45 Questions
Exam 18: Security Auditing45 Questions
Exam 19: Legal and Ethical Aspects45 Questions
Exam 20: Symmetric Encryption and Message Confidentiality45 Questions
Exam 21: Public-Key Cryptography and Message Authentication45 Questions
Exam 22: Internet Security Protocols and Standards45 Questions
Exam 23: Internet Authentication Applications45 Questions
Exam 24: Wireless Network Security45 Questions
Select questions type
A software utility initially developed at MIT and available both in the public domain and in commercially supported versions,________ is the defacto standard for remote authentication.
Free
(Essay)
4.9/5
(29)
Correct Answer:
Kerberos
_____ is a markup language that uses sets of embedded tags or labels to characterize text elements within a document so as to indicate their appearance,function,meaning,or context.
Free
(Multiple Choice)
4.9/5
(34)
Correct Answer:
C
The ticket-granting ticket is not reusable.
Free
(True/False)
4.8/5
(45)
Correct Answer:
False
_______ systems are automated methods of verifying or recognizing identity on the basis of some physiological or behavioral characteristic.
(Essay)
5.0/5
(27)
A principal element of an identity management system is _______.
(Multiple Choice)
4.9/5
(50)
______ is the set of hardware,software,people,policies,and procedures needed to create,manage,store,distribute,and revoke digital certificates based on asymmetric cryptography.
(Essay)
4.8/5
(33)
________ allows end entities to restore their encryption/decryption key pair from an authorized key backup facility.
(Essay)
4.9/5
(34)
The _________ is an optional bit string field used to identify uniquely the issuing CA in the event the X.500 name has been reused for different entities.
(Essay)
4.7/5
(36)
The focus of _________ is defining an identity for each user,associating attributes with the identity,and enforcing a means by which a user can verify identity.
(Essay)
4.9/5
(34)
_______ certificates are used in most network security applications,including IP security,secure sockets layer,secure electronic transactions,and S/MIME.
(Multiple Choice)
4.9/5
(32)
In a generic identity management architecture _______ are entities that obtain and employ data maintained and provided by identity and attribute providers,often to support authorization decisions and to collect audit information.
(Essay)
4.9/5
(30)
The certification _________ is the issuer of certificates and certificate revocation lists.
(Essay)
4.9/5
(35)
CMP,defined in RFC 2510,is designed to be a flexible protocol able
to accommodate a variety of technical,operational,and business models.
(True/False)
4.9/5
(39)
_______ is an XML-based language for the exchange of security information between online business partners.
(Essay)
4.8/5
(37)
_______ is a minimal set of conventions for invoking code using XML over HTTP that enables applications to request services from one another with XML-based requests and receive responses as data formatted with XML.
(Multiple Choice)
4.9/5
(33)
An integer value unique within the issuing CA that is unambiguously associated with the certificate is the ________.
(Multiple Choice)
4.8/5
(36)
The overall scheme of Kerberos is that of a trusted third-party
authentication service.
(True/False)
4.8/5
(31)
The ticket contains the user's ID,the server's ID,a __________,a lifetime after which the ticket is invalid,and a copy of the same session key sent in the outer message to the client.
(Essay)
4.7/5
(33)
Showing 1 - 20 of 45
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)