Deck 16: User Authentication

Full screen (f)
exit full mode
Question
the __________ approach is unsuitable for a connectionless type of application because it requires the overhead of a handshake before any connectionless transmission, effectively negating the chief characteristic of a connectionless transaction.

A)timestamp
B)backward reply
C)challenge-response
D)replay
Use Space or
up arrow
down arrow
to flip the card.
Question
SSO enables a user to access all network resources after a single
authentication.
Question
________ is a procedure that allows communicating parties to verify that the contents of a received message have not been altered and that the source is authentic.

A)Identification
B)Message authentication
C)Verification
D)User authentication
Question
the simplest replay attack is one in which the opponent simply
copies a message and replays it later.
Question
_________ establishes that a subject is who they claim to be to a stated level of certitude.

A)Credential authentication
B)Digital identity
C)Digital authentication
D)Identity proofing
Question
Multifactor authentication is generally no more secure than single
factor authentication.
Question
the overall scheme of Kerberos is that of a trusted third party authentication service that uses a protocol based on a proposal by __________ .

A)Needham and Schroeder
B)Kehn
C)Denning
D)Gong
Question
the challenge-response approach is unsuitable for a
connectionless type of application beause it requires the overhead of a handshake before any connectionless transmission.
Question
the credential service provider is a trusted entity that issues or
registers subscriber authenticators.
Question
there are a variety of problems including dealing with false
positives and false negatives, user acceptance, cost, and
convenience with respect to biometric authenticators.
Question
Subscriber is a subject whose identity is to be verified using one or
more authentication protocols.
Question
there are four general means, or authentication factors, of
authenticating a user's identity, which can be used alone or in combination.
Question
Kerberos relies exclusively on symmetric encryption.
Question
the clocks among the various participants are not required to be
synchronized when using the timestamp approach.
Question
One way to counter suppress-replay attacks is to enforce the
requirement that parties regularly check their clocks against the KDC's clock.
Question
Authentication enables organizations to keep their networks
secure by permitting only authenticated users to access its protected resources.
Question
Examples of dynamic biometrics include recognition by fingerprint,
retina, and face.
Question
Inherence factor is something the individual is or does.
Question
____________ technology provides access control for systems by checking to see if a user's credentials match the credentials in a database of authorized users or in a data authentication server.

A)Authentication
B)Verification
C)Identification
D)Clarification
Question
Identity federation is in essence an extension of identity
management to multiple security domains.
Question
the __________ is an entity that verifies the claimant's identity by verifying the claimant's possession and control of one or two authenticators using an authentication protocol.
Question
____________ authentication involves a single transfer of information from one user (A) intended for another (B).
Question
__________ is an extension of identity management to multiple security domains such as autonomous internal business units, external business partners and other third party applications and services with the goal of sharing digital identities so that a user can be authenticated a single time and then access applications and resources across multiple domains.

A)Identity federation
B)Kerberos
C)Attribute service
D)Data security management
Question
the authenticator that is used as a possession factor is a __________ .

A)fingerprint
B)token
C)PIN
D)secret question answer
Question
A subject undergoing the processes of enrollment and identity proofing is the __________ .

A)relying party
B)subscriber
C)applicant
D)claimant
Question
the __________ is a data structure that authoritatively binds an identity and additional attributes to one or more authenticators possessed by a subscriber, and can be verified when presented to the verifier in an authentication transaction.
Question
_________ protocols enable communicating parties to satisfy themselves mutually about each other's identity and to exchange session keys.
Question
A Kerberos _____ is a set of managed nodes that share the same Kerberos database.
Question
__________ assign attributes to users, such as roles, access permissions, and employee information.

A)Principals
B)Administrators
C)Identity providers
D)Identity managers
Question
In an unprotected network environment any client can apply to any server for service.the obvious security risk of this is __________ .

A)certification
B)authentication
C)impersonation
D)authorization
Question
A centralized, automated approach to provide enterprise-wide access to resources by employees and other authorized individuals with a focus of defining an identity for each user, associating attributes with the identity, and enforcing a means by which a user can verify identity is __________ .

A)enterprise management
B)identity management
C)federated identity management
D)realm management
Question
User __________ is the process of determining whether some user or some application or process acting on behalf of a user is, in fact, who or what it declares itself to be.
Question
the __________ is unsuitable for a connectionless type of application because it requires the overhead of a handshake before any connectionless transmission, effectively negating the chief characteristic of a connectionless transaction.

A)timestamp approach
B)challenge-response approach
C)simple replay approach
D)one-way authentication approach
Question
__________ are items that connect to a computer logically or physically in order to authenticate identity.
Question
the specific items used during authentication, such as a password or hardware token, are referred to as __________ .
Question
Requiring the user to demonstrate knowledge of secret information and routinely used in single-layer authentication processes, __________ can come in the form of passwords, passphrases, PINs, or answers to secret questions.
Question
A Kerberos __________ is a set of managed nodes that share the same Kerberos database.

A)realm
B)tGS
C)network
D)principal
Question
the three authentication factors of authenticating a user's identity are: knowledge factor, possession factor, and __________ factor.
Question
An entity that relies upon the subscriber's authenticator(s) and credentials or a verifier's assertion of a claimant's identity, typically to process a transaction or grant access to information or a system is the __________ .

A)claimant
B)relying party
C)subscriber
D)applicant
Question
Kerberos relies exclusively on __________ .

A)symmetric encryption
B)asymmetric encryption
C)private key encryption
D)public key encryption
Question
A ticket is encrypted with a secret key known only to the
AS and the __________ .
Question
A __________ is a random value to be repeated in a message to assure that the response is fresh and has not been replayed by an opponent.
Question
Characteristics, called __________ , that are unique or almost unique to the individual, include fingerprint, voice, handwriting, and face.
Question
In order to convince a server that a user is authentic, the authentication server creates a __________ that is encrypted using the secret key shared by the AS and that server that contains the user's ID and network address and the server's ID.
Question
Principal names consist of three parts: a service or user name, an __________ ,
and a realm name.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/45
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 16: User Authentication
1
the __________ approach is unsuitable for a connectionless type of application because it requires the overhead of a handshake before any connectionless transmission, effectively negating the chief characteristic of a connectionless transaction.

A)timestamp
B)backward reply
C)challenge-response
D)replay
C
2
SSO enables a user to access all network resources after a single
authentication.
True
3
________ is a procedure that allows communicating parties to verify that the contents of a received message have not been altered and that the source is authentic.

A)Identification
B)Message authentication
C)Verification
D)User authentication
B
4
the simplest replay attack is one in which the opponent simply
copies a message and replays it later.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
5
_________ establishes that a subject is who they claim to be to a stated level of certitude.

A)Credential authentication
B)Digital identity
C)Digital authentication
D)Identity proofing
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
6
Multifactor authentication is generally no more secure than single
factor authentication.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
7
the overall scheme of Kerberos is that of a trusted third party authentication service that uses a protocol based on a proposal by __________ .

A)Needham and Schroeder
B)Kehn
C)Denning
D)Gong
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
8
the challenge-response approach is unsuitable for a
connectionless type of application beause it requires the overhead of a handshake before any connectionless transmission.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
9
the credential service provider is a trusted entity that issues or
registers subscriber authenticators.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
10
there are a variety of problems including dealing with false
positives and false negatives, user acceptance, cost, and
convenience with respect to biometric authenticators.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
11
Subscriber is a subject whose identity is to be verified using one or
more authentication protocols.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
12
there are four general means, or authentication factors, of
authenticating a user's identity, which can be used alone or in combination.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
13
Kerberos relies exclusively on symmetric encryption.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
14
the clocks among the various participants are not required to be
synchronized when using the timestamp approach.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
15
One way to counter suppress-replay attacks is to enforce the
requirement that parties regularly check their clocks against the KDC's clock.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
16
Authentication enables organizations to keep their networks
secure by permitting only authenticated users to access its protected resources.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
17
Examples of dynamic biometrics include recognition by fingerprint,
retina, and face.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
18
Inherence factor is something the individual is or does.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
19
____________ technology provides access control for systems by checking to see if a user's credentials match the credentials in a database of authorized users or in a data authentication server.

A)Authentication
B)Verification
C)Identification
D)Clarification
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
20
Identity federation is in essence an extension of identity
management to multiple security domains.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
21
the __________ is an entity that verifies the claimant's identity by verifying the claimant's possession and control of one or two authenticators using an authentication protocol.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
22
____________ authentication involves a single transfer of information from one user (A) intended for another (B).
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
23
__________ is an extension of identity management to multiple security domains such as autonomous internal business units, external business partners and other third party applications and services with the goal of sharing digital identities so that a user can be authenticated a single time and then access applications and resources across multiple domains.

A)Identity federation
B)Kerberos
C)Attribute service
D)Data security management
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
24
the authenticator that is used as a possession factor is a __________ .

A)fingerprint
B)token
C)PIN
D)secret question answer
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
25
A subject undergoing the processes of enrollment and identity proofing is the __________ .

A)relying party
B)subscriber
C)applicant
D)claimant
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
26
the __________ is a data structure that authoritatively binds an identity and additional attributes to one or more authenticators possessed by a subscriber, and can be verified when presented to the verifier in an authentication transaction.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
27
_________ protocols enable communicating parties to satisfy themselves mutually about each other's identity and to exchange session keys.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
28
A Kerberos _____ is a set of managed nodes that share the same Kerberos database.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
29
__________ assign attributes to users, such as roles, access permissions, and employee information.

A)Principals
B)Administrators
C)Identity providers
D)Identity managers
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
30
In an unprotected network environment any client can apply to any server for service.the obvious security risk of this is __________ .

A)certification
B)authentication
C)impersonation
D)authorization
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
31
A centralized, automated approach to provide enterprise-wide access to resources by employees and other authorized individuals with a focus of defining an identity for each user, associating attributes with the identity, and enforcing a means by which a user can verify identity is __________ .

A)enterprise management
B)identity management
C)federated identity management
D)realm management
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
32
User __________ is the process of determining whether some user or some application or process acting on behalf of a user is, in fact, who or what it declares itself to be.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
33
the __________ is unsuitable for a connectionless type of application because it requires the overhead of a handshake before any connectionless transmission, effectively negating the chief characteristic of a connectionless transaction.

A)timestamp approach
B)challenge-response approach
C)simple replay approach
D)one-way authentication approach
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
34
__________ are items that connect to a computer logically or physically in order to authenticate identity.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
35
the specific items used during authentication, such as a password or hardware token, are referred to as __________ .
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
36
Requiring the user to demonstrate knowledge of secret information and routinely used in single-layer authentication processes, __________ can come in the form of passwords, passphrases, PINs, or answers to secret questions.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
37
A Kerberos __________ is a set of managed nodes that share the same Kerberos database.

A)realm
B)tGS
C)network
D)principal
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
38
the three authentication factors of authenticating a user's identity are: knowledge factor, possession factor, and __________ factor.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
39
An entity that relies upon the subscriber's authenticator(s) and credentials or a verifier's assertion of a claimant's identity, typically to process a transaction or grant access to information or a system is the __________ .

A)claimant
B)relying party
C)subscriber
D)applicant
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
40
Kerberos relies exclusively on __________ .

A)symmetric encryption
B)asymmetric encryption
C)private key encryption
D)public key encryption
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
41
A ticket is encrypted with a secret key known only to the
AS and the __________ .
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
42
A __________ is a random value to be repeated in a message to assure that the response is fresh and has not been replayed by an opponent.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
43
Characteristics, called __________ , that are unique or almost unique to the individual, include fingerprint, voice, handwriting, and face.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
44
In order to convince a server that a user is authentic, the authentication server creates a __________ that is encrypted using the secret key shared by the AS and that server that contains the user's ID and network address and the server's ID.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
45
Principal names consist of three parts: a service or user name, an __________ ,
and a realm name.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 45 flashcards in this deck.