Question

In: Computer Science

1. Using Kerberos for authentication eliminates the need for a user to have a password for...

1. Using Kerberos for authentication eliminates the need for a user to have a password for each server or resource they want to access.

True

False

2. Secure hash functions provide data integrity, but not data authenticity .

True

False

3. Which of the following is an example of "Something you possess"?

Key

Face Recognition

Finger print

Password

4. ____________ enables the sharing of identities across different enterprises for user access to applications.

Identity Federation

Kerberos Realm

Public-key infrastructure

Multifactor Authentication

5. Which of the following is considered an offline password attack?

Man-in-the-middle attack

Packet sniffing attack

Replay Attack

Rainbow Attack

6. Linux based system use a method called __________ in their password hashes to create unique hashes for all passwords.

LM-hash

SHA-512

Virtual Secure Mode

Salting

Solutions

Expert Solution

1. Using Kerberos for authentication eliminates the need for a user to have a password for each server or resource they want to access.
True
Kerberos eleimate the need for having passswords for each server in a cluster

2. Secure hash functions provide data integrity, but not data authenticity .
True
The reason is that secure hash functions check if the integrity is present but cannot verify the source/origin and hence cannot provide data authenticiy

3. Which of the following is an example of "Something you possess" ?
Key
Facial Recog and Fingerprints are example of "Something you are"
Password is an example of "Something you know"

4. ____________ enables the sharing of identities across different enterprises for user access to applications.
Identity Federation links user identity across multiple domain and access to applications

5. Which of the following is considered an offline password attack?
Rainbow Attack


6. Linux based system use a method called __________ in their password hashes to create unique hashes for all passwords.
Salting



Related Solutions

Using C++ Write a program to ask user to enter a password and validity the password....
Using C++ Write a program to ask user to enter a password and validity the password. The password should be 8 – 20 characters long (8 is included and 20 is included), it should contain at least one uppercase letter and one lower case letter. The password should contain at least one digit, and at least one symbol other than alphabets or numbers. Most importantly, the password may not contain any white space. Functions: You will need at least the...
Compare different methods of user authentication methods (One-Way authentication & Two-way authentication), such as the pros...
Compare different methods of user authentication methods (One-Way authentication & Two-way authentication), such as the pros and cons within each strategy and the necessary circumstances.
Developer User Account Create a user account using T-SQL for developers named DEVELOPER with the password...
Developer User Account Create a user account using T-SQL for developers named DEVELOPER with the password TESTACCOUNT that grants the user the ability to: Select and modify any table. Connect to and have access to all resources. In SSMS
Reusable Passwords The most common authentication credential is the reusable password, which is a string of...
Reusable Passwords The most common authentication credential is the reusable password, which is a string of characters that a user types to gain access to the resources associated with a certain username (account) on a computer. These are called reusable passwords because the user types the password each time he or she needs access to the resource. Unfortunately, the reusable password is the weakest form of authentication, and it is appropriate only for the least sensitive assets.Ease of Use and...
C# Create an application that asks the user to enter their new password. The password must...
C# Create an application that asks the user to enter their new password. The password must be at least 6 characters long. Develop a custom exception handling case that checks for the password length. (hint: use " .Length " built-in method). If the new password is less than 6 characters long the custom exception should output an error message.
c++ Develop a program that validates a password entered by a user. The password must meet...
c++ Develop a program that validates a password entered by a user. The password must meet the following criteria: Be at least six characters long. Contain at least one uppercase and at least one lowercase letter. Have at least one digit. Write a program that asks for a password and then verifies that it meets the stated criteria. If it does not, the program should display a message telling the user why and ask for another password. The program should...
MTAs are unauthenticated. What effect would requiring user authentication to send email have on the email...
MTAs are unauthenticated. What effect would requiring user authentication to send email have on the email system?
Create a program (Python) YourFirstnameLastnameA06b.py to ask the user to create a password: The user will...
Create a program (Python) YourFirstnameLastnameA06b.py to ask the user to create a password: The user will first enter a password, then enters the same password again; If the second input is the same as first one, the user successfully creates the password. Print “Well done.”; Otherwise, the user will be directed to repeat the whole process (go to step 1.)
Answer the below quesions in short using your own words - Explain Windows User Authentication process...
Answer the below quesions in short using your own words - Explain Windows User Authentication process on Local Windows Machine. - Explain the Windows User Authentication process for Client connecting to the domain - How NTLM work for Windows User Authentication process
Discuss some of the successful user password policies that companies have used for their networks. What...
Discuss some of the successful user password policies that companies have used for their networks. What are some of the challenges that a company faces when it attempts to implement a very secure and stringent password policy?
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT