Exam 23: Internet Authentication Applications

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A software utility initially developed at MIT and available both in the public domain and in commercially supported versions,________ is the defacto standard for remote authentication.

Free
(Essay)
4.9/5
(29)
Correct Answer:
Verified

Kerberos

_____ is a markup language that uses sets of embedded tags or labels to characterize text elements within a document so as to indicate their appearance,function,meaning,or context.

Free
(Multiple Choice)
4.9/5
(34)
Correct Answer:
Verified

C

The ticket-granting ticket is not reusable.

Free
(True/False)
4.8/5
(45)
Correct Answer:
Verified

False

_______ systems are automated methods of verifying or recognizing identity on the basis of some physiological or behavioral characteristic.

(Essay)
5.0/5
(27)

An obvious security risk is that of impersonation.

(True/False)
4.7/5
(42)

A principal element of an identity management system is _______.

(Multiple Choice)
4.9/5
(50)

______ is the set of hardware,software,people,policies,and procedures needed to create,manage,store,distribute,and revoke digital certificates based on asymmetric cryptography.

(Essay)
4.8/5
(33)

________ allows end entities to restore their encryption/decryption key pair from an authorized key backup facility.

(Essay)
4.9/5
(34)

The _________ is an optional bit string field used to identify uniquely the issuing CA in the event the X.500 name has been reused for different entities.

(Essay)
4.7/5
(36)

Kerberos does not support interrealm authentication.

(True/False)
4.9/5
(29)

The focus of _________ is defining an identity for each user,associating attributes with the identity,and enforcing a means by which a user can verify identity.

(Essay)
4.9/5
(34)

_______ certificates are used in most network security applications,including IP security,secure sockets layer,secure electronic transactions,and S/MIME.

(Multiple Choice)
4.9/5
(32)

In a generic identity management architecture _______ are entities that obtain and employ data maintained and provided by identity and attribute providers,often to support authorization decisions and to collect audit information.

(Essay)
4.9/5
(30)

The certification _________ is the issuer of certificates and certificate revocation lists.

(Essay)
4.9/5
(35)

CMP,defined in RFC 2510,is designed to be a flexible protocol able to accommodate a variety of technical,operational,and business models.

(True/False)
4.9/5
(39)

_______ is an XML-based language for the exchange of security information between online business partners.

(Essay)
4.8/5
(37)

_______ is a minimal set of conventions for invoking code using XML over HTTP that enables applications to request services from one another with XML-based requests and receive responses as data formatted with XML.

(Multiple Choice)
4.9/5
(33)

An integer value unique within the issuing CA that is unambiguously associated with the certificate is the ________.

(Multiple Choice)
4.8/5
(36)

The overall scheme of Kerberos is that of a trusted third-party authentication service.

(True/False)
4.8/5
(31)

The ticket contains the user's ID,the server's ID,a __________,a lifetime after which the ticket is invalid,and a copy of the same session key sent in the outer message to the client.

(Essay)
4.7/5
(33)
Showing 1 - 20 of 45
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)