Deck 7: Authentication and Authorization With Java
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Match between columns
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/42
Play
Full screen (f)
Deck 7: Authentication and Authorization With Java
1
5)PAM modules cannot be stacked together to support "stacked authentication" where an application can use one or more PAM modules for authentication.
False
2
13)The JAAS framework defines the term ____ to represent the requester for a service.
A) resource
B) credential
C) subject
D) principal
A) resource
B) credential
C) subject
D) principal
C
3
17)The ____ class is used by SaslServer to determine whether or not one entity can act on behalf of another entity in the SASL environment.
A) ChoiceCallback
B) AuthorizeCallback
C) LanguageCallback
D) RealmCallback
A) ChoiceCallback
B) AuthorizeCallback
C) LanguageCallback
D) RealmCallback
B
4
19)The ____ class retrieves realm information for SaslClient and SaslServer.
A) ChoiceCallback
B) RealmCallback
C) LanguageCallback
D) AuthorizeCallback
A) ChoiceCallback
B) RealmCallback
C) LanguageCallback
D) AuthorizeCallback
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
5
2)A good authentication technology should be platform and system dependent.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
6
18)The ___ class retrieves the locale used for localizing text.
A) ChoiceCallback
B) AuthorizeCallback
C) LanguageCallback
D) RealmCallback
A) ChoiceCallback
B) AuthorizeCallback
C) LanguageCallback
D) RealmCallback
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
7
7)____ authentication is usually used with lightweight directory access protocol (LDAP) and Web authentication that transmits credentials across the network as an MD5 hash or message digest.
A) Passport
B) Digest
C) Kerberos
D) NTLM
A) Passport
B) Digest
C) Kerberos
D) NTLM
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
8
15)The ____ class represents a Java implementation of the PAM framework.
A) CallbackHandler
B) Principal
C) LoginContext
D) Subject
A) CallbackHandler
B) Principal
C) LoginContext
D) Subject
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
9
12)With ____, authorization is implemented by allowing the administrator to control which users or groups have the right to perform various administrative functions or to take any action that affects systemwide resources.
A) administrative privileges
B) permissions inheritance
C) user-based authorization
D) discretionary access to securable objects
A) administrative privileges
B) permissions inheritance
C) user-based authorization
D) discretionary access to securable objects
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
10
6)To log all user roles and trace who, when, and what actions an entity performs, ____ is usually implemented with authentication and authorization.
A) sniffing
B) surveillance
C) auditing
D) ACL
A) sniffing
B) surveillance
C) auditing
D) ACL
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
11
9)The idea of ____ is that all security contexts are linked to a user instead of an application.
A) discretionary access to securable objects
B) permissions inheritance
C) administrative privileges
D) user-based authorization
A) discretionary access to securable objects
B) permissions inheritance
C) administrative privileges
D) user-based authorization
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
12
8)____ authentication is an industry standard documented under RFC 1510 that is used with either a password or a smart card for interactive log on.
A) Kerberos
B) NTLM
C) LDAP
D) Digest
A) Kerberos
B) NTLM
C) LDAP
D) Digest
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
13
3)Java 2 provides access controls based on where the code originated from and who signed the code.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
14
16)To support stacked authentication, each PAM module, using the LoginModule interface, supports the notion of two-phase authentication using the login() and ____ method.
A) commit()
B) logout()
C) submit()
D) reset()
A) commit()
B) logout()
C) submit()
D) reset()
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
15
10)With ____, authorization is implemented when you control permissions for new objects created in a container object by setting inheritable permissions on the container.
A) user-based authorization
B) permissions inheritance
C) discretionary access to securable objects
D) administrative privileges
A) user-based authorization
B) permissions inheritance
C) discretionary access to securable objects
D) administrative privileges
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
16
14)Regarding JAAS, the term ____ is used to represent a name associated with a subject.
A) Subject
B) Resource
C) Credential
D) Principal
A) Subject
B) Resource
C) Credential
D) Principal
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
17
Without authentication, it is impossible to assure who an entity is and whether or not to authorize any action at all.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
18
4)The Java security architecture itself has the ability to enforce authentication, or determining who runs the code, and authorization or determining what actions can be performed.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
19
20)The ____ PAM module prompts for a username and password. It then verifies the password against the password stored in a directory service configured using Java naming and directory interface (JNDI).
A) JndiLoginModule
B) KeyStoreLoginModule
C) SolarisLoginModule
D) UnixLoginModule
A) JndiLoginModule
B) KeyStoreLoginModule
C) SolarisLoginModule
D) UnixLoginModule
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
20
11)____ enables authorization to be self-managed as an object owner can set permissions on all objects she or he created.
A) User-based authorization
B) Permissions inheritance
C) Administrative privileges
D) Discretionary access to securable objects
A) User-based authorization
B) Permissions inheritance
C) Administrative privileges
D) Discretionary access to securable objects
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
21
33)Compare one-factor and multiple-factor authentication.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
22
38)Briefly describe the Refreshable interface.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
23
40)What are the general steps performed when authenticating a Subject in JAAS?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
24
31)A Subject can also own security-related attributes. These attributes are called ____________________ in JAAS.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
25
37)What are some of the benefits of using pluggable authentication modules?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
26
34)Does a "good" authentication technology that is platform/system independent and provides SSO exist today? Explain your answer.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
27
22)The ____ PAM module retrieves and makes available Solaris UID/GID/groups information for the current user.
A) NTLoginModule
B) SolarisSystem
C) UnixLoginModule
D) KeyStoreLoginModule
A) NTLoginModule
B) SolarisSystem
C) UnixLoginModule
D) KeyStoreLoginModule
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
28
24)The Java platform implements the concept of ____ to support thread execution across multiple modules with different context characteristics.
A) least privilege
B) least-common-denominator
C) private credentials
D) privilege credentials
A) least privilege
B) least-common-denominator
C) private credentials
D) privilege credentials
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
29
39)Briefly describe the Destroyable interface.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
30
21)The ____ PAM module provides a JAAS login module that prompts for a keystore alias and populates the subject with the alias's principal and credentials.
A) NTLoginModule
B) SolarisLoginModule
C) UnixLoginModule
D) KeyStoreLoginModule
A) NTLoginModule
B) SolarisLoginModule
C) UnixLoginModule
D) KeyStoreLoginModule
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
31
27)____________________ is the assurance that an entity is who it claims to be.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
32
28)____________________ is concerned with what an identity is allowed to do.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
33
36)What are the main goals of JAAS?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
34
41)What are some of the levels that can be set to specify the impact of the success or failure of a given log-in procedure on the overall JAAS authentication procedure?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
35
30)Authentication in JAAS is performed in a pluggable and stackable fashion. It is based on a concept called the ___________________ framework.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
36
26)In Java, a(n) ____ is used to make system resource access decisions based on the context it encapsulates.
A) AccessController
B) ACLController
C) AccessPolicyContext
D) AccessControlContext
A) AccessController
B) ACLController
C) AccessPolicyContext
D) AccessControlContext
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
37
23)The ____ PAM module retrieves and makes available Unix UID/GID/groups information for the current user.
A) UnixLoginModule
B) SolarisSystem
C) SolarisLoginModule
D) UnixSystem
A) UnixLoginModule
B) SolarisSystem
C) SolarisLoginModule
D) UnixSystem
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
38
29)____________________ is a list attached to an object in a system. It consists of control expressions, each of which grants or denies some ability to a particular user or group of users.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
39
35)Briefly describe authorization.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
40
25)In Java, the ____ class does this comparison. It programmatically checks permissions and obtains the current Subject associated with the active access control context as well.
A) AccessPolicy
B) ACLController
C) AccessController
D) AccessControlContext
A) AccessPolicy
B) ACLController
C) AccessController
D) AccessControlContext
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
41
Match between columns
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
42
42)Briefly describe the java.security.policy class.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck