Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Computing
Study Set
Cryptography and Network Security
Quiz 16: User Authentication
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 21
Short Answer
the __________ is an entity that verifies the claimant's identity by verifying the claimant's possession and control of one or two authenticators using an authentication protocol.
Question 22
Short Answer
____________ authentication involves a single transfer of information from one user (A) intended for another (B).
Question 23
Multiple Choice
__________ is an extension of identity management to multiple security domains such as autonomous internal business units, external business partners and other third party applications and services with the goal of sharing digital identities so that a user can be authenticated a single time and then access applications and resources across multiple domains.
Question 24
Multiple Choice
the authenticator that is used as a possession factor is a __________ .
Question 25
Multiple Choice
A subject undergoing the processes of enrollment and identity proofing is the __________ .
Question 26
Short Answer
the __________ is a data structure that authoritatively binds an identity and additional attributes to one or more authenticators possessed by a subscriber, and can be verified when presented to the verifier in an authentication transaction.
Question 27
Short Answer
_________ protocols enable communicating parties to satisfy themselves mutually about each other's identity and to exchange session keys.
Question 28
Short Answer
A Kerberos _____ is a set of managed nodes that share the same Kerberos database.
Question 29
Multiple Choice
__________ assign attributes to users, such as roles, access permissions, and employee information.
Question 30
Multiple Choice
In an unprotected network environment any client can apply to any server for service.the obvious security risk of this is __________ .
Question 31
Multiple Choice
A centralized, automated approach to provide enterprise-wide access to resources by employees and other authorized individuals with a focus of defining an identity for each user, associating attributes with the identity, and enforcing a means by which a user can verify identity is __________ .
Question 32
Short Answer
User __________ is the process of determining whether some user or some application or process acting on behalf of a user is, in fact, who or what it declares itself to be.
Question 33
Multiple Choice
the __________ is unsuitable for a connectionless type of application because it requires the overhead of a handshake before any connectionless transmission, effectively negating the chief characteristic of a connectionless transaction.