In: Computer Science
1. Using Kerberos for authentication eliminates the need for a user to have a password for each server or resource they want to access.
True
False
2. Secure hash functions provide data integrity, but not data authenticity .
True
False
3. Which of the following is an example of "Something you possess"?
Key
Face Recognition
Finger print
Password
4. ____________ enables the sharing of identities across different enterprises for user access to applications.
Identity Federation
Kerberos Realm
Public-key infrastructure
Multifactor Authentication
5. Which of the following is considered an offline password attack?
Man-in-the-middle attack
Packet sniffing attack
Replay Attack
Rainbow Attack
6. Linux based system use a method called __________ in their password hashes to create unique hashes for all passwords.
LM-hash
SHA-512
Virtual Secure Mode
Salting
1. Using Kerberos for authentication eliminates the need for a
user to have a password for each server or resource they want to
access.
True
Kerberos eleimate the need for having passswords for each server in
a cluster
2. Secure hash functions provide data integrity, but not data
authenticity .
True
The reason is that secure hash functions check if the integrity is
present but cannot verify the source/origin and hence cannot
provide data authenticiy
3. Which of the following is an example of "Something you possess"
?
Key
Facial Recog and Fingerprints are example of "Something you
are"
Password is an example of "Something you know"
4. ____________ enables the sharing of identities across different
enterprises for user access to applications.
Identity Federation links user identity across
multiple domain and access to applications
5. Which of the following is considered an offline password
attack?
Rainbow Attack
6. Linux based system use a method called __________ in their
password hashes to create unique hashes for all passwords.
Salting