1.
Which of the following offers advantages such as the ability to use stronger passwords, easier password administration, one set of credential, and faster resource access?
2.
Which of the following describes the major disadvantage of many Single Sign-On (SSO) implementations?
3.
Which of the following is implemented through scripts or smart agents that replays the users multiple log-ins against authentication servers to verify a user's identity which permit access to system services?
4.
Which of the following is a trusted, third party authentication protocol that was developed under Project Athena at MIT?
5.
Which of the following is NOT true of the Kerberos protocol?
6.
Which of the following is addressed by Kerberos?
7.
Kerberos is vulnerable to replay in which of the following circumstances?
8.
Like the Kerberos protocol, SESAME is also subject to which of the following?
9.
RADIUS incorporates which of the following services?
10.
Which of the following protects a password from eavesdroppers and supports the encryption of communication?