Answer the following statements true (T) or false (F)
1. The operating system cannot enforce access-control policies based on user identity.
2. The security of the Kerberos server should not automatically be assumed, but must be guarded carefully by taking precautions such as placing the server in a locked room.
3. Once the server verifies that the user ID in the ticket is the same as the unecrypted user ID in the message it considers the user authenticated and grants the requested service.
4. It is the ticket that proves the client's identity.
5. Identity providers may also assign attributes to users, such as roles, access permissions, and employee information.
1. FALSE
2. TRUE
3. TRUE
4. FALSE
5. FALSE
You might also like to view...
The Ironman movies are ________ works based on the original Marvel Ironman comic books
Fill in the blank(s) with correct word
Evaluate the expression, being careful to follow the order of operations.
A.
B.
C.
D.
E.