Which of the following is the difference between identi…
Which of the following is the difference between identification and authentication of a user?
The fundamental information security principals include…
The fundamental information security principals include confidentiality, availability and ____________?
Which of the following provides a user ID and password …
Which of the following provides a user ID and password together?
Which of the following is an authentication method that…
Which of the following is an authentication method that can be secured by using SSL?
Which of the following is an XML based open standard us…
Which of the following is an XML based open standard used in the exchange of authentication and
authorization information between different parties?
Which of the following authentication services is being…
A system administrator is configuring UNIX accounts to authenticate against an external server. The
configuration file asks for the following information DC=ServerName and DC=COM. Which of the following
authentication services is being used?
Which of the following was based on a previous X.500 sp…
Which of the following was based on a previous X.500 specification and allows either unencrypted
authentication or encrypted authentication through the use of TLS?
Which of the following authentication services would th…
An information bank has been established to store contacts, phone numbers and other records.
An application running on UNIX would like to connect to this index server using port 88. Which of the following
authentication services would this use this port by default?
Which of the following authentication services uses a t…
Which of the following authentication services uses a ticket granting system to provide access?
Which of the following types of authentication solution…
Which of the following types of authentication solutions use tickets to provide access to various resources from
a central location?