Vous êtes sur la page 1sur 2

CHAPTER

4: KEY DISTRIBUTION AND USER AUTHENTICATION




TRUE OR FALSE

T
F
1. For symmetric encryption to work the two parties to an exchange
must share the same key, and that key must be protected from
access by others.

T
F
2. It is not necessary for a certification authority to maintain a list of
certificates issued by that CA that were not expired but were
revoked.

T
F
3. A session key is destroyed at the end of a session.

T
F
4. Kerberos relies exclusively on asymmetric encryption and makes
use of public key encryption.

T
F
5. The automated key distribution approach provides the flexibility
and dynamic characteristics needed to allow a number of users
to access a number of servers and for the servers to exchange data
with each other.

T
F
6. If an opponent captures an unexpired service granting ticket and
tries to use it they will be denied access to the corresponding
service.

T
F
7. The ticket-granting ticket is encrypted with a secret key known
only to the authentication server and the ticket granting server.

T
F
8. If the lifetime stamped on a ticket is very short (e.g., minutes) an
opponent has a greater opportunity for replay.

T
F
9. Kerberos version 4 did not fully address the need to be of general
purpose.

T
F
10. One of the major roles of public-key encryption is to address the
problem of key distribution.

T
F
11. It is not required for two parties to share a secret key in order to
communicate securely with conventional encryption.

T
F
12. X.509 is based on the use of public-key cryptography and digital

signatures.


T
F
13. User certificates generated by a CA need special efforts made by
the directory to protect them from being forged.

14. The principal underlying standard for federated identity is the


Security Assertion Markup Language (SAML) which defines the
exchange of security information between online business
partners.

T
F
15. Federated identity management is a concept dealing with the
use of a common identity management scheme across multiple
enterprises and numerous applications and supporting many
thousands, even millions, of users.