Exam 23: Internet Authentication Applications

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

One of the earliest and most widely used services is _________.

Free
(Multiple Choice)
4.8/5
(36)
Correct Answer:
Verified

A

________ is a process where authentication and permission will be passed on from one system to another, usually across multiple enterprises, reducing the number of authentications needed by the user.

Free
(Multiple Choice)
4.9/5
(27)
Correct Answer:
Verified

D

_______ systems are automated methods of verifying or recognizing identity on the basis of some physiological or behavioral characteristic.

Free
(Short Answer)
4.8/5
(36)
Correct Answer:
Verified

Biometric

The authentication server shares a unique secret key with each server.

(True/False)
4.9/5
(33)

The _______ consists of two dates: the first and last on which the certificate is valid.

(Multiple Choice)
4.8/5
(34)

CMP, defined in RFC 2510, is designed to be a flexible protocol ableto accommodate a variety of technical, operational, and business models.

(True/False)
4.8/5
(31)

The certification _________ is the issuer of certificates and certificate revocation lists.

(Short Answer)
4.8/5
(40)

Kerberos is designed to counter only one specific threat to the securityof a client/server dialogue.

(True/False)
4.8/5
(24)

The focus of _________ is defining an identity for each user, associating attributes with the identity, and enforcing a means by which a user can verify identity.

(Short Answer)
4.8/5
(39)

An obvious security risk is that of impersonation.

(True/False)
4.8/5
(34)

The ticket-granting ticket is encrypted with a secret key known only tothe AS and the TGS.

(True/False)
4.8/5
(38)

A software utility initially developed at MIT and available both in the public domain and in commercially supported versions, ________ is the defacto standard for remote authentication.

(Short Answer)
4.9/5
(34)

_______ is a minimal set of conventions for invoking code using XML over HTTP that enables applications to request services from one another with XML-based requests and receive responses as data formatted with XML.

(Multiple Choice)
4.8/5
(44)

Because serial numbers are unique within a CA, the serial number issufficient to identify the certificate.

(True/False)
4.8/5
(43)

In a generic identity management architecture _______ are entities that obtain and employ data maintained and provided by identity and attribute providers, often to support authorization decisions and to collect audit information.

(Short Answer)
4.7/5
(34)

Kerberos does not support interrealm authentication.

(True/False)
4.8/5
(34)

The ticket-granting ticket is not reusable.

(True/False)
4.9/5
(31)

The principal objective for developing a PKI is to enable secure,convenient, and efficient acquisition of private keys.

(True/False)
4.9/5
(43)

A _______ is a generic term used to denote any method for storing certificates and CRLs so that they can be retrieved by end entities.

(Multiple Choice)
4.8/5
(27)

_______ is important as part of the directory service that it supports and is also a basic building block used in other standards.

(Multiple Choice)
4.9/5
(29)
Showing 1 - 20 of 45
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)