Deck 23: Internet Authentication Applications

ملء الشاشة (f)
exit full mode
سؤال
The approach taken by Kerberos is using authentication software tied
to a secure authentication server.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
X.509 provides a format for use in revoking a key before it expires.
سؤال
The authentication server shares a unique secret key with each server.
سؤال
_______ is important as part of the directory service that it supports and is also a basic building block used in other standards.

A)PKI
B)X.509
C)Kerberos
D)FIM
سؤال
Kerberos is designed to counter only one specific threat to the security
of a client/server dialogue.
سؤال
________ requires that a user prove his or her identity for each service invoked and,optionally,requires servers to prove their identity to clients.

A)FIM
B)Kerberos
C)X.509
D)PKI
سؤال
The principal objective for developing a PKI is to enable secure,
convenient,and efficient acquisition of private keys.
سؤال
An obvious security risk is that of impersonation.
سؤال
The ticket-granting ticket is encrypted with a secret key known only to
the AS and the TGS.
سؤال
Kerberos uses the _______ encryption algorithm.

A)AES
B)PKI
C)DES
D)TGS
سؤال
Update is not required when the certificate lifetime expires or as a
result of certificate revocation.
سؤال
Federated identity management makes use of a number of standards
that provide the building blocks for secure identity information exchange across different domains or heterogeneous systems.
سؤال
The ticket-granting ticket is not reusable.
سؤال
Because serial numbers are unique within a CA,the serial number is
sufficient to identify the certificate.
سؤال
CMP,defined in RFC 2510,is designed to be a flexible protocol able
to accommodate a variety of technical,operational,and business models.
سؤال
Kerberos does not support interrealm authentication.
سؤال
One of the earliest and most widely used services is _________.

A)Kerberos
B)FIM
C)PKI
D)X.509
سؤال
Initialization begins the process of enrolling in a PKI.
سؤال
The overall scheme of Kerberos is that of a trusted third-party
authentication service.
سؤال
_______ certificates are used in most network security applications,including IP security,secure sockets layer,secure electronic transactions,and S/MIME.

A)X.509
B)PKI
C)FIM
D)SCA
سؤال
_______ is the process in which a CA issues a certificate for a user's public key and returns that certificate to the user's client system and/or posts that certificate in a repository.

A)Certification
B)Registration
C)Initialization
D)Authorization
سؤال
An alternative to each server being required to confirm identities of clients who request service is to use an _______ that knows the passwords of all users and stores them in a centralized database.
سؤال
A software utility initially developed at MIT and available both in the public domain and in commercially supported versions,________ is the defacto standard for remote authentication.
سؤال
A full-service Kerberos environment consisting of a Kerberos server that has the user ID and password of all participating users in its database and shares a secret key with each server,all users and servers being registered with the Kerberos server,is referred to as a Kerberos ______.
سؤال
______ is the set of hardware,software,people,policies,and procedures needed to create,manage,store,distribute,and revoke digital certificates based on asymmetric cryptography.
سؤال
_______ systems are automated methods of verifying or recognizing identity on the basis of some physiological or behavioral characteristic.
سؤال
_______ is movement of data in a business process.

A)Provisioning
B)Workflow automation
C)Revocation
D)Initialization
سؤال
________ allows end entities to restore their encryption/decryption key pair from an authorized key backup facility.
سؤال
The focus of _________ is defining an identity for each user,associating attributes with the identity,and enforcing a means by which a user can verify identity.
سؤال
The certification _________ is the issuer of certificates and certificate revocation lists.
سؤال
The _________ is an optional bit string field used to identify uniquely the issuing CA in the event the X.500 name has been reused for different entities.
سؤال
_____ is a markup language that uses sets of embedded tags or labels to characterize text elements within a document so as to indicate their appearance,function,meaning,or context.

A)HML
B)HTTP
C)XML
D)SOAP
سؤال
The _______ consists of two dates: the first and last on which the certificate is valid.

A)version
B)period of validity
C)extension
D)unique identifier
سؤال
A principal element of an identity management system is _______.

A)workflow automation
B)delegated administration
C)authentication
D)all of the above
سؤال
In a generic identity management architecture a ________ is an identity holder.
سؤال
_______ is the process whereby a user first makes itself known to a CA prior to that CA issuing a certificate or certificates for that user.

A)Authorization
B)Registration
C)Certification
D)Initialization
سؤال
A _______ is a generic term used to denote any method for storing certificates and CRLs so that they can be retrieved by end entities.

A)RA
B)registration
C)repository
D)CA
سؤال
An integer value unique within the issuing CA that is unambiguously associated with the certificate is the ________.

A)issuer name
B)subject's public-key information
C)issuer unique identifier
D)serial number
سؤال
_______ is a minimal set of conventions for invoking code using XML over HTTP that enables applications to request services from one another with XML-based requests and receive responses as data formatted with XML.

A)SOAP
B)SAML
C)HTML
D)WS-Security
سؤال
________ is a process where authentication and permission will be passed on from one system to another,usually across multiple enterprises,reducing the number of authentications needed by the user.

A)Integration
B)Registration
C)Synchronization
D)Federation
سؤال
In a generic identity management architecture _______ are entities that obtain and employ data maintained and provided by identity and attribute providers,often to support authorization decisions and to collect audit information.
سؤال
________ is a set of SOAP extensions for implementing message integrity and confidentiality in Web services.
سؤال
In Kerberos,the ___________ decrypts the ticket and authenticator,verifies the request,and creates ticket for requested server.
سؤال
The ticket contains the user's ID,the server's ID,a __________,a lifetime after which the ticket is invalid,and a copy of the same session key sent in the outer message to the client.
سؤال
_______ is an XML-based language for the exchange of security information between online business partners.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/45
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 23: Internet Authentication Applications
1
The approach taken by Kerberos is using authentication software tied
to a secure authentication server.
True
2
X.509 provides a format for use in revoking a key before it expires.
True
3
The authentication server shares a unique secret key with each server.
True
4
_______ is important as part of the directory service that it supports and is also a basic building block used in other standards.

A)PKI
B)X.509
C)Kerberos
D)FIM
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
5
Kerberos is designed to counter only one specific threat to the security
of a client/server dialogue.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
6
________ requires that a user prove his or her identity for each service invoked and,optionally,requires servers to prove their identity to clients.

A)FIM
B)Kerberos
C)X.509
D)PKI
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
7
The principal objective for developing a PKI is to enable secure,
convenient,and efficient acquisition of private keys.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
8
An obvious security risk is that of impersonation.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
9
The ticket-granting ticket is encrypted with a secret key known only to
the AS and the TGS.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
10
Kerberos uses the _______ encryption algorithm.

A)AES
B)PKI
C)DES
D)TGS
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
11
Update is not required when the certificate lifetime expires or as a
result of certificate revocation.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
12
Federated identity management makes use of a number of standards
that provide the building blocks for secure identity information exchange across different domains or heterogeneous systems.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
13
The ticket-granting ticket is not reusable.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
14
Because serial numbers are unique within a CA,the serial number is
sufficient to identify the certificate.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
15
CMP,defined in RFC 2510,is designed to be a flexible protocol able
to accommodate a variety of technical,operational,and business models.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
16
Kerberos does not support interrealm authentication.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
17
One of the earliest and most widely used services is _________.

A)Kerberos
B)FIM
C)PKI
D)X.509
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
18
Initialization begins the process of enrolling in a PKI.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
19
The overall scheme of Kerberos is that of a trusted third-party
authentication service.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
20
_______ certificates are used in most network security applications,including IP security,secure sockets layer,secure electronic transactions,and S/MIME.

A)X.509
B)PKI
C)FIM
D)SCA
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
21
_______ is the process in which a CA issues a certificate for a user's public key and returns that certificate to the user's client system and/or posts that certificate in a repository.

A)Certification
B)Registration
C)Initialization
D)Authorization
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
22
An alternative to each server being required to confirm identities of clients who request service is to use an _______ that knows the passwords of all users and stores them in a centralized database.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
23
A software utility initially developed at MIT and available both in the public domain and in commercially supported versions,________ is the defacto standard for remote authentication.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
24
A full-service Kerberos environment consisting of a Kerberos server that has the user ID and password of all participating users in its database and shares a secret key with each server,all users and servers being registered with the Kerberos server,is referred to as a Kerberos ______.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
25
______ is the set of hardware,software,people,policies,and procedures needed to create,manage,store,distribute,and revoke digital certificates based on asymmetric cryptography.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
26
_______ systems are automated methods of verifying or recognizing identity on the basis of some physiological or behavioral characteristic.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
27
_______ is movement of data in a business process.

A)Provisioning
B)Workflow automation
C)Revocation
D)Initialization
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
28
________ allows end entities to restore their encryption/decryption key pair from an authorized key backup facility.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
29
The focus of _________ is defining an identity for each user,associating attributes with the identity,and enforcing a means by which a user can verify identity.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
30
The certification _________ is the issuer of certificates and certificate revocation lists.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
31
The _________ is an optional bit string field used to identify uniquely the issuing CA in the event the X.500 name has been reused for different entities.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
32
_____ is a markup language that uses sets of embedded tags or labels to characterize text elements within a document so as to indicate their appearance,function,meaning,or context.

A)HML
B)HTTP
C)XML
D)SOAP
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
33
The _______ consists of two dates: the first and last on which the certificate is valid.

A)version
B)period of validity
C)extension
D)unique identifier
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
34
A principal element of an identity management system is _______.

A)workflow automation
B)delegated administration
C)authentication
D)all of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
35
In a generic identity management architecture a ________ is an identity holder.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
36
_______ is the process whereby a user first makes itself known to a CA prior to that CA issuing a certificate or certificates for that user.

A)Authorization
B)Registration
C)Certification
D)Initialization
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
37
A _______ is a generic term used to denote any method for storing certificates and CRLs so that they can be retrieved by end entities.

A)RA
B)registration
C)repository
D)CA
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
38
An integer value unique within the issuing CA that is unambiguously associated with the certificate is the ________.

A)issuer name
B)subject's public-key information
C)issuer unique identifier
D)serial number
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
39
_______ is a minimal set of conventions for invoking code using XML over HTTP that enables applications to request services from one another with XML-based requests and receive responses as data formatted with XML.

A)SOAP
B)SAML
C)HTML
D)WS-Security
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
40
________ is a process where authentication and permission will be passed on from one system to another,usually across multiple enterprises,reducing the number of authentications needed by the user.

A)Integration
B)Registration
C)Synchronization
D)Federation
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
41
In a generic identity management architecture _______ are entities that obtain and employ data maintained and provided by identity and attribute providers,often to support authorization decisions and to collect audit information.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
42
________ is a set of SOAP extensions for implementing message integrity and confidentiality in Web services.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
43
In Kerberos,the ___________ decrypts the ticket and authenticator,verifies the request,and creates ticket for requested server.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
44
The ticket contains the user's ID,the server's ID,a __________,a lifetime after which the ticket is invalid,and a copy of the same session key sent in the outer message to the client.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
45
_______ is an XML-based language for the exchange of security information between online business partners.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.