Exam 23: Internet Authentication Applications
Exam 1: Computer Systems Overview45 Questions
Exam 2: Cryptographic Tools45 Questions
Exam 3: User Authentication45 Questions
Exam 4: Access Control45 Questions
Exam 5: Database and Cloud Security45 Questions
Exam 6: Malicious Software45 Questions
Exam 7: Denial-Of-Service Attacks45 Questions
Exam 8: Intrusion Detection45 Questions
Exam 9: Firewalls and Intrusion Prevention Systems45 Questions
Exam 10: Buffer Overflow45 Questions
Exam 11: Software Security45 Questions
Exam 12: Operating System Security45 Questions
Exam 13: Cloud and Iot Security45 Questions
Exam 14: IT Security Management and Risk Assessment45 Questions
Exam 15: IT Security Controls, Plans, and Procedures45 Questions
Exam 16: Physical and Infrastructure Security45 Questions
Exam 17: Human Resources Security45 Questions
Exam 18: Security Auditing45 Questions
Exam 19: Legal and Ethical Aspects45 Questions
Exam 20: Symmetric Encryption and Message Confidentiality45 Questions
Exam 21: Public-Key Cryptography and Message Authentication45 Questions
Exam 22: Internet Security Protocols and Standards45 Questions
Exam 23: Internet Authentication Applications45 Questions
Exam 24: Wireless Network Security45 Questions
Select questions type
One of the earliest and most widely used services is _________.
Free
(Multiple Choice)
4.8/5
(36)
Correct Answer:
A
________ is a process where authentication and permission will be passed on from one system to another, usually across multiple enterprises, reducing the number of authentications needed by the user.
Free
(Multiple Choice)
4.9/5
(27)
Correct Answer:
D
_______ systems are automated methods of verifying or recognizing identity on the basis of some physiological or behavioral characteristic.
Free
(Short Answer)
4.8/5
(36)
Correct Answer:
Biometric
The authentication server shares a unique secret key with each server.
(True/False)
4.9/5
(33)
The _______ consists of two dates: the first and last on which the certificate is valid.
(Multiple Choice)
4.8/5
(34)
CMP, defined in RFC 2510, is designed to be a flexible protocol ableto accommodate a variety of technical, operational, and business models.
(True/False)
4.8/5
(31)
The certification _________ is the issuer of certificates and certificate revocation lists.
(Short Answer)
4.8/5
(40)
Kerberos is designed to counter only one specific threat to the securityof a client/server dialogue.
(True/False)
4.8/5
(24)
The focus of _________ is defining an identity for each user, associating attributes with the identity, and enforcing a means by which a user can verify identity.
(Short Answer)
4.8/5
(39)
The ticket-granting ticket is encrypted with a secret key known only tothe AS and the TGS.
(True/False)
4.8/5
(38)
A software utility initially developed at MIT and available both in the public domain and in commercially supported versions, ________ is the defacto standard for remote authentication.
(Short Answer)
4.9/5
(34)
_______ is a minimal set of conventions for invoking code using XML over HTTP that enables applications to request services from one another with XML-based requests and receive responses as data formatted with XML.
(Multiple Choice)
4.8/5
(44)
Because serial numbers are unique within a CA, the serial number issufficient to identify the certificate.
(True/False)
4.8/5
(43)
In a generic identity management architecture _______ are entities that obtain and employ data maintained and provided by identity and attribute providers, often to support authorization decisions and to collect audit information.
(Short Answer)
4.7/5
(34)
The principal objective for developing a PKI is to enable secure,convenient, and efficient acquisition of private keys.
(True/False)
4.9/5
(43)
A _______ is a generic term used to denote any method for storing certificates and CRLs so that they can be retrieved by end entities.
(Multiple Choice)
4.8/5
(27)
_______ is important as part of the directory service that it supports and is also a basic building block used in other standards.
(Multiple Choice)
4.9/5
(29)
Showing 1 - 20 of 45
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)