Week 3 – AAA Security (Not Roadside Assistance) Post author:Devendra Kumar Post published: Post comments:0 Comments it security defense against the digital dark arts week 3 answers Authentication 1. How is authentication different from authorization? Answers Authentication is verifying access to a resource; authorization is verifying an identity.Authentication is identifying a resource; authorization is verifying access to an identity.They’re the same thing.Authentication is verifying an identity; authorization is verifying access to a resource. 2. What are some characteristics of a strong password? Check all that apply, Answers Includes numbers and special charactersIs used across accounts and systemsContains dictionary wordsIs at least eight characters long 3. In a multi-factor authentication scheme, a password can be thought of as: Answers something you have.something you use.something you know.something you are. 4. What are some drawbacks to using biometrics for authentication? Check all that apply. Answers Biometric authentication is difficult or impossible to change if compromised.Biometrics are easy to share.There are potential privacy concerns.Biometric authentication is much slower than alternatives. 5. In what way are U2F tokens more secure than OTP generators? Answers They can’t be cloned.They’re password-protected.They’re cheaper.They’re resistant to phishing attacks. 6. What elements of a certificate are inspected when a certificate is verified? Check all that apply. Answers Trust of the signatory CA“Not valid before” dateCertificate key size“Not valid after” date 7. What is a CRL? Answers Certificate Revocation ListCertificate Recording LanguageCaramel Raspberry LemonCertified Recursive Listener 8. What are the names of similar entities that a Directory server organizes entities into? Answers ClustersGroupsTressOrganizational Units 9. True or false: The Network Access Server handles the actual authentication in a RADIUS scheme. Answers TrueFalse 10. True or false: Clients authenticate directly against the RADIUS server. Answers TrueFalse 11. What does a Kerberos authentication server issue to a client that successfully authenticates? Answers An encryption keyA ticket-granting ticketA master passwordA digital certificate 12. What advantages does single sign-on offer? Check all that apply. Answers It reduces the total number of credentials,It enforces multifactor authentication.It reduces time spent authenticating.It provides encrypted authentication. 13. What does OpenID provide? Answers Certificate signingDigital signaturesAuthentication delegationCryptographic hashing Next Please Share This Share this content Opens in a new window Opens in a new window Opens in a new window Opens in a new window Opens in a new window Opens in a new window Opens in a new window Opens in a new window Opens in a new window Opens in a new window Opens in a new window Devendra Kumar Project Management Apprentice at Google You Might Also Like Collaboration and Communication Tools Networking Services Leave a Reply Cancel replyCommentEnter your name or username to comment Enter your email address to comment Enter your website URL (optional) Save my name, email, and website in this browser for the next time I comment.