Exam 23: Internet Authentication Applications

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Initialization begins the process of enrolling in a PKI.

(True/False)
4.8/5
(42)

In Kerberos,the ___________ decrypts the ticket and authenticator,verifies the request,and creates ticket for requested server.

(Essay)
4.9/5
(40)

________ requires that a user prove his or her identity for each service invoked and,optionally,requires servers to prove their identity to clients.

(Multiple Choice)
5.0/5
(32)

In a generic identity management architecture a ________ is an identity holder.

(Essay)
4.9/5
(35)

The approach taken by Kerberos is using authentication software tied to a secure authentication server.

(True/False)
4.8/5
(35)

________ is a process where authentication and permission will be passed on from one system to another,usually across multiple enterprises,reducing the number of authentications needed by the user.

(Multiple Choice)
4.8/5
(30)

The ticket-granting ticket is encrypted with a secret key known only to the AS and the TGS.

(True/False)
4.9/5
(32)

_______ is the process in which a CA issues a certificate for a user's public key and returns that certificate to the user's client system and/or posts that certificate in a repository.

(Multiple Choice)
4.8/5
(27)

A full-service Kerberos environment consisting of a Kerberos server that has the user ID and password of all participating users in its database and shares a secret key with each server,all users and servers being registered with the Kerberos server,is referred to as a Kerberos ______.

(Essay)
4.8/5
(33)

Federated identity management makes use of a number of standards that provide the building blocks for secure identity information exchange across different domains or heterogeneous systems.

(True/False)
4.8/5
(29)

Update is not required when the certificate lifetime expires or as a result of certificate revocation.

(True/False)
4.9/5
(40)

________ is a set of SOAP extensions for implementing message integrity and confidentiality in Web services.

(Essay)
4.8/5
(43)

Kerberos is designed to counter only one specific threat to the security of a client/server dialogue.

(True/False)
4.8/5
(42)

Because serial numbers are unique within a CA,the serial number is sufficient to identify the certificate.

(True/False)
4.7/5
(36)

One of the earliest and most widely used services is _________.

(Multiple Choice)
4.8/5
(38)

An alternative to each server being required to confirm identities of clients who request service is to use an _______ that knows the passwords of all users and stores them in a centralized database.

(Essay)
4.9/5
(34)

Kerberos uses the _______ encryption algorithm.

(Multiple Choice)
4.8/5
(36)

X.509 provides a format for use in revoking a key before it expires.

(True/False)
4.8/5
(34)

The _______ consists of two dates: the first and last on which the certificate is valid.

(Multiple Choice)
4.8/5
(36)

_______ is movement of data in a business process.

(Multiple Choice)
4.8/5
(38)
Showing 21 - 40 of 45
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)