Deck 23: Internet Authentication Applications
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/45
Play
Full screen (f)
Deck 23: Internet Authentication Applications
1
The approach taken by Kerberos is using authentication software tied
to a secure authentication server.
to a secure authentication server.
True
2
X.509 provides a format for use in revoking a key before it expires.
True
3
The authentication server shares a unique secret key with each server.
True
4
_______ is important as part of the directory service that it supports and is also a basic building block used in other standards.
A)PKI
B)X.509
C)Kerberos
D)FIM
A)PKI
B)X.509
C)Kerberos
D)FIM
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
5
Kerberos is designed to counter only one specific threat to the security
of a client/server dialogue.
of a client/server dialogue.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
6
________ requires that a user prove his or her identity for each service invoked and,optionally,requires servers to prove their identity to clients.
A)FIM
B)Kerberos
C)X.509
D)PKI
A)FIM
B)Kerberos
C)X.509
D)PKI
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
7
The principal objective for developing a PKI is to enable secure,
convenient,and efficient acquisition of private keys.
convenient,and efficient acquisition of private keys.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
8
An obvious security risk is that of impersonation.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
9
The ticket-granting ticket is encrypted with a secret key known only to
the AS and the TGS.
the AS and the TGS.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
10
Kerberos uses the _______ encryption algorithm.
A)AES
B)PKI
C)DES
D)TGS
A)AES
B)PKI
C)DES
D)TGS
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
11
Update is not required when the certificate lifetime expires or as a
result of certificate revocation.
result of certificate revocation.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
12
Federated identity management makes use of a number of standards
that provide the building blocks for secure identity information exchange across different domains or heterogeneous systems.
that provide the building blocks for secure identity information exchange across different domains or heterogeneous systems.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
13
The ticket-granting ticket is not reusable.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
14
Because serial numbers are unique within a CA,the serial number is
sufficient to identify the certificate.
sufficient to identify the certificate.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
15
CMP,defined in RFC 2510,is designed to be a flexible protocol able
to accommodate a variety of technical,operational,and business models.
to accommodate a variety of technical,operational,and business models.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
16
Kerberos does not support interrealm authentication.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
17
One of the earliest and most widely used services is _________.
A)Kerberos
B)FIM
C)PKI
D)X.509
A)Kerberos
B)FIM
C)PKI
D)X.509
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
18
Initialization begins the process of enrolling in a PKI.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
19
The overall scheme of Kerberos is that of a trusted third-party
authentication service.
authentication service.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
20
_______ certificates are used in most network security applications,including IP security,secure sockets layer,secure electronic transactions,and S/MIME.
A)X.509
B)PKI
C)FIM
D)SCA
A)X.509
B)PKI
C)FIM
D)SCA
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
21
_______ is the process in which a CA issues a certificate for a user's public key and returns that certificate to the user's client system and/or posts that certificate in a repository.
A)Certification
B)Registration
C)Initialization
D)Authorization
A)Certification
B)Registration
C)Initialization
D)Authorization
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
22
An alternative to each server being required to confirm identities of clients who request service is to use an _______ that knows the passwords of all users and stores them in a centralized database.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
23
A software utility initially developed at MIT and available both in the public domain and in commercially supported versions,________ is the defacto standard for remote authentication.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
24
A full-service Kerberos environment consisting of a Kerberos server that has the user ID and password of all participating users in its database and shares a secret key with each server,all users and servers being registered with the Kerberos server,is referred to as a Kerberos ______.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
25
______ is the set of hardware,software,people,policies,and procedures needed to create,manage,store,distribute,and revoke digital certificates based on asymmetric cryptography.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
26
_______ systems are automated methods of verifying or recognizing identity on the basis of some physiological or behavioral characteristic.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
27
_______ is movement of data in a business process.
A)Provisioning
B)Workflow automation
C)Revocation
D)Initialization
A)Provisioning
B)Workflow automation
C)Revocation
D)Initialization
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
28
________ allows end entities to restore their encryption/decryption key pair from an authorized key backup facility.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
29
The focus of _________ is defining an identity for each user,associating attributes with the identity,and enforcing a means by which a user can verify identity.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
30
The certification _________ is the issuer of certificates and certificate revocation lists.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
31
The _________ is an optional bit string field used to identify uniquely the issuing CA in the event the X.500 name has been reused for different entities.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
32
_____ is a markup language that uses sets of embedded tags or labels to characterize text elements within a document so as to indicate their appearance,function,meaning,or context.
A)HML
B)HTTP
C)XML
D)SOAP
A)HML
B)HTTP
C)XML
D)SOAP
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
33
The _______ consists of two dates: the first and last on which the certificate is valid.
A)version
B)period of validity
C)extension
D)unique identifier
A)version
B)period of validity
C)extension
D)unique identifier
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
34
A principal element of an identity management system is _______.
A)workflow automation
B)delegated administration
C)authentication
D)all of the above
A)workflow automation
B)delegated administration
C)authentication
D)all of the above
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
35
In a generic identity management architecture a ________ is an identity holder.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
36
_______ is the process whereby a user first makes itself known to a CA prior to that CA issuing a certificate or certificates for that user.
A)Authorization
B)Registration
C)Certification
D)Initialization
A)Authorization
B)Registration
C)Certification
D)Initialization
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
37
A _______ is a generic term used to denote any method for storing certificates and CRLs so that they can be retrieved by end entities.
A)RA
B)registration
C)repository
D)CA
A)RA
B)registration
C)repository
D)CA
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
38
An integer value unique within the issuing CA that is unambiguously associated with the certificate is the ________.
A)issuer name
B)subject's public-key information
C)issuer unique identifier
D)serial number
A)issuer name
B)subject's public-key information
C)issuer unique identifier
D)serial number
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
39
_______ is a minimal set of conventions for invoking code using XML over HTTP that enables applications to request services from one another with XML-based requests and receive responses as data formatted with XML.
A)SOAP
B)SAML
C)HTML
D)WS-Security
A)SOAP
B)SAML
C)HTML
D)WS-Security
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
40
________ is a process where authentication and permission will be passed on from one system to another,usually across multiple enterprises,reducing the number of authentications needed by the user.
A)Integration
B)Registration
C)Synchronization
D)Federation
A)Integration
B)Registration
C)Synchronization
D)Federation
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
41
In a generic identity management architecture _______ are entities that obtain and employ data maintained and provided by identity and attribute providers,often to support authorization decisions and to collect audit information.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
42
________ is a set of SOAP extensions for implementing message integrity and confidentiality in Web services.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
43
In Kerberos,the ___________ decrypts the ticket and authenticator,verifies the request,and creates ticket for requested server.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
44
The ticket contains the user's ID,the server's ID,a __________,a lifetime after which the ticket is invalid,and a copy of the same session key sent in the outer message to the client.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
45
_______ is an XML-based language for the exchange of security information between online business partners.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck