Exam 23: Internet Authentication Applications

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

_______ is movement of data in a business process.

(Multiple Choice)
4.8/5
(24)

The approach taken by Kerberos is using authentication software tiedto a secure authentication server.

(True/False)
4.9/5
(30)

The overall scheme of Kerberos is that of a trusted third-partyauthentication service.

(True/False)
4.9/5
(36)

Initialization begins the process of enrolling in a PKI.

(True/False)
4.8/5
(30)

________ allows end entities to restore their encryption/decryption key pair from an authorized key backup facility.

(Short Answer)
5.0/5
(31)

Update is not required when the certificate lifetime expires or as aresult of certificate revocation.

(True/False)
4.9/5
(35)

The _________ is an optional bit string field used to identify uniquely the issuing CA in the event the X.500 name has been reused for different entities.

(Short Answer)
4.8/5
(30)

________ requires that a user prove his or her identity for each service invoked and, optionally, requires servers to prove their identity to clients.

(Multiple Choice)
4.9/5
(27)

_____ is a markup language that uses sets of embedded tags or labels to characterize text elements within a document so as to indicate their appearance, function, meaning, or context.

(Multiple Choice)
4.9/5
(29)

An integer value unique within the issuing CA that is unambiguously associated with the certificate is the ________.

(Multiple Choice)
4.8/5
(25)

______ is the set of hardware, software, people, policies, and procedures needed to create, manage, store, distribute, and revoke digital certificates based on asymmetric cryptography.

(Short Answer)
4.7/5
(36)

A principal element of an identity management system is _______.

(Multiple Choice)
4.8/5
(37)

X.509 provides a format for use in revoking a key before it expires.

(True/False)
4.8/5
(41)

_______ is an XML-based language for the exchange of security information between online business partners.

(Short Answer)
4.8/5
(37)

A full-service Kerberos environment consisting of a Kerberos server that has the user ID and password of all participating users in its database and shares a secret key with each server, all users and servers being registered with the Kerberos server, is referred to as a Kerberos ______.

(Short Answer)
4.8/5
(39)

_______ is the process whereby a user first makes itself known to a CA prior to that CA issuing a certificate or certificates for that user.

(Multiple Choice)
4.7/5
(31)

_______ certificates are used in most network security applications, including IP security, secure sockets layer, secure electronic transactions, and S/MIME.

(Multiple Choice)
4.8/5
(33)

The ticket contains the user's ID, the server's ID, a __________, a lifetime after which the ticket is invalid, and a copy of the same session key sent in the outer message to the client.

(Short Answer)
4.8/5
(31)

In Kerberos, the ___________ decrypts the ticket and authenticator, verifies the request, and creates ticket for requested server.

(Short Answer)
4.9/5
(33)

________ is a set of SOAP extensions for implementing message integrity and confidentiality in Web services.

(Short Answer)
4.8/5
(43)
Showing 21 - 40 of 45
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)