Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Computing
Study Set
Network Security Essentials
Quiz 4: Key Distribution and User Authentication
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Question 1
Short Answer
A __________ indicates the length of time for which a ticket is valid (e.g., eight hours).
Question 2
True/False
The ticket-granting ticket is encrypted with a secret key known only to the authentication server and the ticket granting server.
Question 3
Short Answer
When two end systems wish to communicate they establish a logical connection and, for the duration of that logical connection, all user data are encrypted with a one-time __________ which is destroyed at the end of the session.
Question 4
True/False
User certificates generated by a CA need special efforts made by the directory to protect them from being forged.
Question 5
True/False
One of the major roles of public-key encryption is to address the problem of key distribution.
Question 6
True/False
It is not required for two parties to share a secret key in order to communicate securely with conventional encryption.
Question 7
True/False
The principal underlying standard for federated identity is the Security Assertion Markup Language (SAML) which defines the exchange of security information between online business partners. 1.A _________ is a key used between entities for the purpose of distributing session keys.
Question 8
True/False
For symmetric encryption to work the two parties to an exchange must share the same key, and that key must be protected from access by others.
Question 9
Short Answer
After determining which systems are allowed to communicate with each other and granting permission for the two systems to establish a connection, the _________ provides a one-time session key for that connection.
Question 10
True/False
The automated key distribution approach provides the flexibility and dynamic characteristics needed to allow a number of users to access a number of servers and for the servers to exchange data with each other.