Podcast
Questions and Answers
What is the process of reliably verifying the identity of someone (or something)?
What is the process of reliably verifying the identity of someone (or something)?
- Validation
- Authorization
- Authentication (correct)
- Identification
What is the closed world assumption related to?
What is the closed world assumption related to?
- Authentication protocols
- Open world assumption
- Negation as failure (correct)
- Identity verification
In which scenario does X.509 protocol play a role?
In which scenario does X.509 protocol play a role?
- Authenticating through credit card expiration date
- Authenticating one computer by another (correct)
- Authenticating through appearance or voice recognition
- Authenticating a person using a public workstation
What does Alice need to show to Bob in one of the authentication scenarios described?
What does Alice need to show to Bob in one of the authentication scenarios described?
What is the main purpose of Kerberos in authentication?
What is the main purpose of Kerberos in authentication?
Flashcards are hidden until you start studying