c.
Signed credentials are stored as unsigned data.d.
Unsigned credentials are stored as signed data.13. In electronic authentication, electronic credentials are stored as data in a directory or database. Which of the following refers to when the directory or database is untrusted?
a.
Self-authenticatingb.
Authentication to the relying partyc.
Authentication to the verifierd.
Authentication to the credential service provider14. The correct flows and proper interactions between parties involved in electronic authentication include:
a.
Applicant⇒Registration Authority⇒Subscriber⇒Claimantb.
Registration Authority⇒Applicant⇒Claimant⇒Subscriberc.
Subscriber⇒Applicant⇒Registration Authority⇒Claimantd.
Claimant⇒Subscriber⇒Registration Authority⇒ApplicantAn individual applicant applies to a registration authority (RA) through a registration process to become a subscriber of a credential service provider (CSP)
The RA identity proofs that applicant
On successful identity proofing, the RA sends the CSP a registration confirmation message
A secret token and a corresponding credential are established between the CSP and the new subscriber for use in subsequent authentication events
The party to be authenticated is called a claimant (subscriber) and the party verifying that identity is called a verifier
The other three choices are incorrect because they do not represent the correct flows and proper interactions.
15. In electronic authentication, which of the following represents the correct order of passing information about assertions?
a.
Subscriber⇒Credential Service Provider⇒Registration Authorityb.
Verifier⇒Claimant⇒Relying Partyc.
Relying Party⇒Claimant⇒Registration Authorityd.
Verifier⇒Credential Service Provider⇒Relying Party16. From an access control viewpoint, which of the following are restricted access control models?
1.
Identity-based access control policy2.
Attribute-based access control policy3.
Bell-LaPadula access control model4.
Domain type enforcement access control modela.
1 and 2b.
2 and 3c.
3 and 4d.
1, 2, 3, and 417. Regarding password guessing and cracking threats, which of the following can help mitigate such threats?
a.
Passwords with low entropy, larger salts, and smaller stretchingb.
Passwords with high entropy, smaller salts, and smaller stretchingc.
Passwords with high entropy, larger salts, and larger stretchingd.
Passwords with low entropy, smaller salts, and larger stretching