Which process is being described by the following steps? 1. A user logs into domain A using a PKI certificate on a smartcard protected by an 8-digit PIN. 2. The credential is cached by the authenticating server in domain

A.
3. Later, the user attempts to access a resource in domain B.
4. A request to the original authenticating server is initiated to somehow attest to the resource server in the second domain that the user is in fact who they claim to be.

A. HTML
B. SAML
C. SOAP
D. IPsec

B
Explanation: The steps provided describe the operation of SAML.

Exam 3

Computer Science & Information Technology

You might also like to view...

When drawing with the Pencil tool, what does an asterisk (*) next to the cursor

indicate? What will be an ideal response?

Computer Science & Information Technology

What does the conversion rate of a web site measure? Give an example of “taking action” on an e-commerce site. What would be an example of taking action on a college admissions web site? Many students who are seeking employment will post their rŽsumŽs on their personal web sites. What would be an example of taking action in this case?

What will be an ideal response?

Computer Science & Information Technology