Services
Discover
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Computing
Study Set
Computer Security Principles and Practice Study Set 1
Exam 23: Internet Authentication Applications
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 1
Essay
A software utility initially developed at MIT and available both in the public domain and in commercially supported versions,________ is the defacto standard for remote authentication.
Question 2
Multiple Choice
_____ is a markup language that uses sets of embedded tags or labels to characterize text elements within a document so as to indicate their appearance,function,meaning,or context.
Question 3
True/False
The ticket-granting ticket is not reusable.
Question 4
Essay
_______ systems are automated methods of verifying or recognizing identity on the basis of some physiological or behavioral characteristic.
Question 5
True/False
An obvious security risk is that of impersonation.
Question 6
Multiple Choice
A principal element of an identity management system is _______.
Question 7
Essay
______ is the set of hardware,software,people,policies,and procedures needed to create,manage,store,distribute,and revoke digital certificates based on asymmetric cryptography.
Question 8
Essay
________ allows end entities to restore their encryption/decryption key pair from an authorized key backup facility.
Question 9
Essay
The _________ is an optional bit string field used to identify uniquely the issuing CA in the event the X.500 name has been reused for different entities.
Question 10
True/False
Kerberos does not support interrealm authentication.
Question 11
Essay
The focus of _________ is defining an identity for each user,associating attributes with the identity,and enforcing a means by which a user can verify identity.
Question 12
Multiple Choice
_______ certificates are used in most network security applications,including IP security,secure sockets layer,secure electronic transactions,and S/MIME.
Question 13
Essay
In a generic identity management architecture _______ are entities that obtain and employ data maintained and provided by identity and attribute providers,often to support authorization decisions and to collect audit information.