Matching
Match each item with a statement below:
Premises:
a traditional authentication method for Windows operating systems using a simple challenge response protocol
protocol that picks one of the available authentication methods for a system
the core authentication class in JAAS
a framework for authentication and authorization in Internet protocols
divides authentication into the authentication interface library, and the actual authentication mechanism-specific modules
a place where a number of services are being offered
a feature that enables users to access resources over the network without having to repeatedly supply their credentials
retrieves and makes available NT security information for the current user
allows fine-grained control over the mapping between access control and tasks performed in the deployment area
Responses:
PAM
LoginContext
NTSystem PAM
Single sign-on
SASL
Resource
Role-based authorization
NTLM authentication
Negotiate
Correct Answer:
Premises:
Responses:
a traditional authentication method for Windows operating systems using a simple challenge response protocol
protocol that picks one of the available authentication methods for a system
the core authentication class in JAAS
a framework for authentication and authorization in Internet protocols
divides authentication into the authentication interface library, and the actual authentication mechanism-specific modules
a place where a number of services are being offered
a feature that enables users to access resources over the network without having to repeatedly supply their credentials
retrieves and makes available NT security information for the current user
allows fine-grained control over the mapping between access control and tasks performed in the deployment area
Premises:
a traditional authentication method for Windows operating systems using a simple challenge response protocol
protocol that picks one of the available authentication methods for a system
the core authentication class in JAAS
a framework for authentication and authorization in Internet protocols
divides authentication into the authentication interface library, and the actual authentication mechanism-specific modules
a place where a number of services are being offered
a feature that enables users to access resources over the network without having to repeatedly supply their credentials
retrieves and makes available NT security information for the current user
allows fine-grained control over the mapping between access control and tasks performed in the deployment area
Responses:
Related Questions
Q32: _ is concerned with what an identity
Q33: What are the main goals of JAAS?
Q34: What are some of the levels that
Q35: Authentication in JAAS is performed in a
Q36: In Java, a(n) _ is used to
Q37: The _ PAM module retrieves and makes
Q38: _ is a list attached to an
Q39: Briefly describe authorization.
Q40: In Java, the _ class does this
Q42: Briefly describe the java.security.policy class.
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents