Answer the following statements true (T) or false (F)

1. The operating system cannot enforce access-control policies based on user identity.
2. The security of the Kerberos server should not automatically be assumed, but must be guarded carefully by taking precautions such as placing the server in a locked room.
3. Once the server verifies that the user ID in the ticket is the same as the unecrypted user ID in the message it considers the user authenticated and grants the requested service.
4. It is the ticket that proves the client's identity.
5. Identity providers may also assign attributes to users, such as roles, access permissions, and employee information.

1. FALSE
2. TRUE
3. TRUE
4. FALSE
5. FALSE

Computer Science & Information Technology

You might also like to view...

The Ironman movies are ________ works based on the original Marvel Ironman comic books

Fill in the blank(s) with correct word

Computer Science & Information Technology

Evaluate the expression, being careful to follow the order of operations.

A.
B.
C.
D.
E.

Computer Science & Information Technology