Front | Back |
What is Non-Repudation?
|
The Ability to prove that a transaction has occured.
|
What is Authentication?
|
Determining the identity of a person, Host or Process Via a Trusted Process.
|
What is Authorization?
|
The Act of recognizing an authenticated person, host or process defined on a particular host or authentication system.
|
What is Access Control?
|
Allowing an authorized person, host or process to access a resource.
|
What is Risk?
|
Describes overall Exposure experienced by a network or business.
|
What is Single Sign-On Authentication?
|
The Ablitiy for a user, host or process to authenticate once to access multiple resources.
|
What is the purpose of a Kerberos Server?
|
It acts as a trusted third party that stores secret keys.
|
At what level of the OSI Model does IPsec Occur?
|
The Network Layer
|
What are two types of Mutual Authentication?
|
Simple and Complex
|
What is Simple Authentication?
|
Systems do not use a Third party to authenticate with each other.
|
What is Complex Authentication?
|
A trusted third party contains of Generates and manages all authentication data.
|
What type of application is John the Ripper?
|
A Password-Cracking Application.
|
In a Kerberos Scheme, What is Each participating User, Host or Process Called?
|
A Principal
|
What type of Key Encryption does Kerberos use?
|
Symmetric-Key Encryption.
|
What is the Purpose of a Key Distrobution Center (KDC)?
|
It provides Session Keys to Authenticated Users.
|