Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Computing
Study Set
Cryptography and Network Security
Quiz 15: User Authentication Protocols
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 21
Essay
____________ is a centralized,automated approach to provide enterprise wide access to resources by employees and other authorized individuals.
Question 22
Essay
There are four general means of authenticating a user's identity.They are: something the individual knows,something the individual possesses,something the individual is,and something the individual __________ .
Question 23
Multiple Choice
The principal underlying standard for federated identity is the __________ which defines the exchange of security information between online business partners.
Question 24
Multiple Choice
A Kerberos __________ is a set of managed nodes that share the same Kerberos database.
Question 25
Essay
__________ in Greek mythology is a three headed dog with a serpent's tail that guards the entrance of Hades.
Question 26
Essay
The first published report on Kerberos listed the following requirements: secure,reliable,scalable and __________ .
Question 27
Multiple Choice
__________ is an extension of identity management to multiple security domains such as autonomous internal business units,external business partners and other third party applications and services with the goal of sharing digital identities so that a user can be authenticated a single time and then access applications and resources across multiple domains.
Question 28
Multiple Choice
Presenting an identifier to the security system is the __________ step.
Question 29
Essay
Examples of something the individual possesses would include cryptographic keys,electronic keycards,smart cards,and physical keys.This type of authenticator is referred to as a __________ .
Question 30
Multiple Choice
The __________ is unsuitable for a connectionless type of application because it requires the overhead of a handshake before any connectionless transmission effectively negating the chief characteristic of a connectionless transaction.