Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Computing
Study Set
Network Security Essentials
Quiz 4: Key Distribution and User Authentication
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Question 1
Short Answer
A __________ indicates the length of time for which a ticket is valid (e.g., eight hours).
Question 2
True/False
The ticket-granting ticket is encrypted with a secret key known only to the authentication server and the ticket granting server.
Question 3
Short Answer
When two end systems wish to communicate they establish a logical connection and, for the duration of that logical connection, all user data are encrypted with a one-time __________ which is destroyed at the end of the session.
Question 4
True/False
User certificates generated by a CA need special efforts made by the directory to protect them from being forged.
Question 5
True/False
One of the major roles of public-key encryption is to address the problem of key distribution.
Question 6
True/False
It is not required for two parties to share a secret key in order to communicate securely with conventional encryption.
Question 7
True/False
The principal underlying standard for federated identity is the Security Assertion Markup Language (SAML) which defines the exchange of security information between online business partners. 1.A _________ is a key used between entities for the purpose of distributing session keys.
Question 8
True/False
For symmetric encryption to work the two parties to an exchange must share the same key, and that key must be protected from access by others.
Question 9
Short Answer
After determining which systems are allowed to communicate with each other and granting permission for the two systems to establish a connection, the _________ provides a one-time session key for that connection.
Question 10
True/False
The automated key distribution approach provides the flexibility and dynamic characteristics needed to allow a number of users to access a number of servers and for the servers to exchange data with each other.
Question 11
True/False
X.509 is based on the use of public-key cryptography and digital signatures.
Question 12
True/False
If the lifetime stamped on a ticket is very short (e.g., minutes) an opponent has a greater opportunity for replay.
Question 13
True/False
Kerberos version 4 did not fully address the need to be of general purpose.
Question 14
True/False
Kerberos relies exclusively on asymmetric encryption and makes use of public key encryption.
Question 15
True/False
Federated identity management is a concept dealing with the use of a common identity management scheme across multiple enterprises and numerous applications and supporting many thousands, even millions, of users.
Question 16
Short Answer
The strength of any cryptographic system rests with the _________ technique, a term that refers to the means of delivering a key to two parties that wish to exchange data without allowing others to see the key.