Deck 16: User Authentication

ملء الشاشة (f)
exit full mode
سؤال
the __________ approach is unsuitable for a connectionless type of application because it requires the overhead of a handshake before any connectionless transmission, effectively negating the chief characteristic of a connectionless transaction.

A)timestamp
B)backward reply
C)challenge-response
D)replay
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
SSO enables a user to access all network resources after a single
authentication.
سؤال
________ is a procedure that allows communicating parties to verify that the contents of a received message have not been altered and that the source is authentic.

A)Identification
B)Message authentication
C)Verification
D)User authentication
سؤال
the simplest replay attack is one in which the opponent simply
copies a message and replays it later.
سؤال
_________ establishes that a subject is who they claim to be to a stated level of certitude.

A)Credential authentication
B)Digital identity
C)Digital authentication
D)Identity proofing
سؤال
Multifactor authentication is generally no more secure than single
factor authentication.
سؤال
the overall scheme of Kerberos is that of a trusted third party authentication service that uses a protocol based on a proposal by __________ .

A)Needham and Schroeder
B)Kehn
C)Denning
D)Gong
سؤال
the challenge-response approach is unsuitable for a
connectionless type of application beause it requires the overhead of a handshake before any connectionless transmission.
سؤال
the credential service provider is a trusted entity that issues or
registers subscriber authenticators.
سؤال
there are a variety of problems including dealing with false
positives and false negatives, user acceptance, cost, and
convenience with respect to biometric authenticators.
سؤال
Subscriber is a subject whose identity is to be verified using one or
more authentication protocols.
سؤال
there are four general means, or authentication factors, of
authenticating a user's identity, which can be used alone or in combination.
سؤال
Kerberos relies exclusively on symmetric encryption.
سؤال
the clocks among the various participants are not required to be
synchronized when using the timestamp approach.
سؤال
One way to counter suppress-replay attacks is to enforce the
requirement that parties regularly check their clocks against the KDC's clock.
سؤال
Authentication enables organizations to keep their networks
secure by permitting only authenticated users to access its protected resources.
سؤال
Examples of dynamic biometrics include recognition by fingerprint,
retina, and face.
سؤال
Inherence factor is something the individual is or does.
سؤال
____________ technology provides access control for systems by checking to see if a user's credentials match the credentials in a database of authorized users or in a data authentication server.

A)Authentication
B)Verification
C)Identification
D)Clarification
سؤال
Identity federation is in essence an extension of identity
management to multiple security domains.
سؤال
the __________ is an entity that verifies the claimant's identity by verifying the claimant's possession and control of one or two authenticators using an authentication protocol.
سؤال
____________ authentication involves a single transfer of information from one user (A) intended for another (B).
سؤال
__________ is an extension of identity management to multiple security domains such as autonomous internal business units, external business partners and other third party applications and services with the goal of sharing digital identities so that a user can be authenticated a single time and then access applications and resources across multiple domains.

A)Identity federation
B)Kerberos
C)Attribute service
D)Data security management
سؤال
the authenticator that is used as a possession factor is a __________ .

A)fingerprint
B)token
C)PIN
D)secret question answer
سؤال
A subject undergoing the processes of enrollment and identity proofing is the __________ .

A)relying party
B)subscriber
C)applicant
D)claimant
سؤال
the __________ is a data structure that authoritatively binds an identity and additional attributes to one or more authenticators possessed by a subscriber, and can be verified when presented to the verifier in an authentication transaction.
سؤال
_________ protocols enable communicating parties to satisfy themselves mutually about each other's identity and to exchange session keys.
سؤال
A Kerberos _____ is a set of managed nodes that share the same Kerberos database.
سؤال
__________ assign attributes to users, such as roles, access permissions, and employee information.

A)Principals
B)Administrators
C)Identity providers
D)Identity managers
سؤال
In an unprotected network environment any client can apply to any server for service.the obvious security risk of this is __________ .

A)certification
B)authentication
C)impersonation
D)authorization
سؤال
A centralized, automated approach to provide enterprise-wide access to resources by employees and other authorized individuals with a focus of defining an identity for each user, associating attributes with the identity, and enforcing a means by which a user can verify identity is __________ .

A)enterprise management
B)identity management
C)federated identity management
D)realm management
سؤال
User __________ is the process of determining whether some user or some application or process acting on behalf of a user is, in fact, who or what it declares itself to be.
سؤال
the __________ is unsuitable for a connectionless type of application because it requires the overhead of a handshake before any connectionless transmission, effectively negating the chief characteristic of a connectionless transaction.

A)timestamp approach
B)challenge-response approach
C)simple replay approach
D)one-way authentication approach
سؤال
__________ are items that connect to a computer logically or physically in order to authenticate identity.
سؤال
the specific items used during authentication, such as a password or hardware token, are referred to as __________ .
سؤال
Requiring the user to demonstrate knowledge of secret information and routinely used in single-layer authentication processes, __________ can come in the form of passwords, passphrases, PINs, or answers to secret questions.
سؤال
A Kerberos __________ is a set of managed nodes that share the same Kerberos database.

A)realm
B)tGS
C)network
D)principal
سؤال
the three authentication factors of authenticating a user's identity are: knowledge factor, possession factor, and __________ factor.
سؤال
An entity that relies upon the subscriber's authenticator(s) and credentials or a verifier's assertion of a claimant's identity, typically to process a transaction or grant access to information or a system is the __________ .

A)claimant
B)relying party
C)subscriber
D)applicant
سؤال
Kerberos relies exclusively on __________ .

A)symmetric encryption
B)asymmetric encryption
C)private key encryption
D)public key encryption
سؤال
A ticket is encrypted with a secret key known only to the
AS and the __________ .
سؤال
A __________ is a random value to be repeated in a message to assure that the response is fresh and has not been replayed by an opponent.
سؤال
Characteristics, called __________ , that are unique or almost unique to the individual, include fingerprint, voice, handwriting, and face.
سؤال
In order to convince a server that a user is authentic, the authentication server creates a __________ that is encrypted using the secret key shared by the AS and that server that contains the user's ID and network address and the server's ID.
سؤال
Principal names consist of three parts: a service or user name, an __________ ,
and a realm name.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/45
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 16: User Authentication
1
the __________ approach is unsuitable for a connectionless type of application because it requires the overhead of a handshake before any connectionless transmission, effectively negating the chief characteristic of a connectionless transaction.

A)timestamp
B)backward reply
C)challenge-response
D)replay
C
2
SSO enables a user to access all network resources after a single
authentication.
True
3
________ is a procedure that allows communicating parties to verify that the contents of a received message have not been altered and that the source is authentic.

A)Identification
B)Message authentication
C)Verification
D)User authentication
B
4
the simplest replay attack is one in which the opponent simply
copies a message and replays it later.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
5
_________ establishes that a subject is who they claim to be to a stated level of certitude.

A)Credential authentication
B)Digital identity
C)Digital authentication
D)Identity proofing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
6
Multifactor authentication is generally no more secure than single
factor authentication.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
7
the overall scheme of Kerberos is that of a trusted third party authentication service that uses a protocol based on a proposal by __________ .

A)Needham and Schroeder
B)Kehn
C)Denning
D)Gong
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
8
the challenge-response approach is unsuitable for a
connectionless type of application beause it requires the overhead of a handshake before any connectionless transmission.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
9
the credential service provider is a trusted entity that issues or
registers subscriber authenticators.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
10
there are a variety of problems including dealing with false
positives and false negatives, user acceptance, cost, and
convenience with respect to biometric authenticators.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
11
Subscriber is a subject whose identity is to be verified using one or
more authentication protocols.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
12
there are four general means, or authentication factors, of
authenticating a user's identity, which can be used alone or in combination.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
13
Kerberos relies exclusively on symmetric encryption.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
14
the clocks among the various participants are not required to be
synchronized when using the timestamp approach.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
15
One way to counter suppress-replay attacks is to enforce the
requirement that parties regularly check their clocks against the KDC's clock.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
16
Authentication enables organizations to keep their networks
secure by permitting only authenticated users to access its protected resources.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
17
Examples of dynamic biometrics include recognition by fingerprint,
retina, and face.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
18
Inherence factor is something the individual is or does.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
19
____________ technology provides access control for systems by checking to see if a user's credentials match the credentials in a database of authorized users or in a data authentication server.

A)Authentication
B)Verification
C)Identification
D)Clarification
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
20
Identity federation is in essence an extension of identity
management to multiple security domains.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
21
the __________ is an entity that verifies the claimant's identity by verifying the claimant's possession and control of one or two authenticators using an authentication protocol.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
22
____________ authentication involves a single transfer of information from one user (A) intended for another (B).
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
23
__________ is an extension of identity management to multiple security domains such as autonomous internal business units, external business partners and other third party applications and services with the goal of sharing digital identities so that a user can be authenticated a single time and then access applications and resources across multiple domains.

A)Identity federation
B)Kerberos
C)Attribute service
D)Data security management
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
24
the authenticator that is used as a possession factor is a __________ .

A)fingerprint
B)token
C)PIN
D)secret question answer
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
25
A subject undergoing the processes of enrollment and identity proofing is the __________ .

A)relying party
B)subscriber
C)applicant
D)claimant
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
26
the __________ is a data structure that authoritatively binds an identity and additional attributes to one or more authenticators possessed by a subscriber, and can be verified when presented to the verifier in an authentication transaction.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
27
_________ protocols enable communicating parties to satisfy themselves mutually about each other's identity and to exchange session keys.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
28
A Kerberos _____ is a set of managed nodes that share the same Kerberos database.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
29
__________ assign attributes to users, such as roles, access permissions, and employee information.

A)Principals
B)Administrators
C)Identity providers
D)Identity managers
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
30
In an unprotected network environment any client can apply to any server for service.the obvious security risk of this is __________ .

A)certification
B)authentication
C)impersonation
D)authorization
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
31
A centralized, automated approach to provide enterprise-wide access to resources by employees and other authorized individuals with a focus of defining an identity for each user, associating attributes with the identity, and enforcing a means by which a user can verify identity is __________ .

A)enterprise management
B)identity management
C)federated identity management
D)realm management
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
32
User __________ is the process of determining whether some user or some application or process acting on behalf of a user is, in fact, who or what it declares itself to be.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
33
the __________ is unsuitable for a connectionless type of application because it requires the overhead of a handshake before any connectionless transmission, effectively negating the chief characteristic of a connectionless transaction.

A)timestamp approach
B)challenge-response approach
C)simple replay approach
D)one-way authentication approach
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
34
__________ are items that connect to a computer logically or physically in order to authenticate identity.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
35
the specific items used during authentication, such as a password or hardware token, are referred to as __________ .
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
36
Requiring the user to demonstrate knowledge of secret information and routinely used in single-layer authentication processes, __________ can come in the form of passwords, passphrases, PINs, or answers to secret questions.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
37
A Kerberos __________ is a set of managed nodes that share the same Kerberos database.

A)realm
B)tGS
C)network
D)principal
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
38
the three authentication factors of authenticating a user's identity are: knowledge factor, possession factor, and __________ factor.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
39
An entity that relies upon the subscriber's authenticator(s) and credentials or a verifier's assertion of a claimant's identity, typically to process a transaction or grant access to information or a system is the __________ .

A)claimant
B)relying party
C)subscriber
D)applicant
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
40
Kerberos relies exclusively on __________ .

A)symmetric encryption
B)asymmetric encryption
C)private key encryption
D)public key encryption
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
41
A ticket is encrypted with a secret key known only to the
AS and the __________ .
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
42
A __________ is a random value to be repeated in a message to assure that the response is fresh and has not been replayed by an opponent.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
43
Characteristics, called __________ , that are unique or almost unique to the individual, include fingerprint, voice, handwriting, and face.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
44
In order to convince a server that a user is authentic, the authentication server creates a __________ that is encrypted using the secret key shared by the AS and that server that contains the user's ID and network address and the server's ID.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
45
Principal names consist of three parts: a service or user name, an __________ ,
and a realm name.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.