Which of thefollowing has the correct mapping of technology type and characteristic?

There are several examples of single sign-on technologies. Which of thefollowing has the correct mapping of technology type and characteristic?

i.Kerberos = Authentication protocol that uses a KDC and tickets, and is based onsymmetric key cryptography
ii. SESAME = Authentication protocol that uses a PAS and PACs, and is based onsymmetric and asymmetric cryptography
iii. Security domains = Resources working under the same security policy and managedby the same group
iv. Thin clients = Terminals that rely upon a central server for access control,processing, and storage

There are several examples of single sign-on technologies. Which of thefollowing has the correct mapping of technology type and characteristic?

i.Kerberos = Authentication protocol that uses a KDC and tickets, and is based onsymmetric key cryptography
ii. SESAME = Authentication protocol that uses a PAS and PACs, and is based onsymmetric and asymmetric cryptography
iii. Security domains = Resources working under the same security policy and managedby the same group
iv. Thin clients = Terminals that rely upon a central server for access control,processing, and storage

A.
i, ii

B.
i, ii, iii

C.
i, ii, iii, iv

D.
ii, ii, iii

Explanation:
Examples of Single Sign-On Technologies:

– Kerberos Authentication protocol that uses a KDC and tickets, and is based onsymmetric key cryptography
– SESAME Authentication protocol that uses a PAS and PACs, and is based on symmetricand asymmetric cryptography
– Security domains Resources working under the same security policy and managed bythe same group
– Thin clients Terminals that rely upon a central server for access control,processing, and storage



Leave a Reply 0

Your email address will not be published. Required fields are marked *