Company XYZ has decided to make use of a cloud-based service that requires mutual, certificate- based authentication with its users. The company uses SSL- inspecting IDS at its network boundary and is concerned about the confidentiality of the mutual authentication.Which of the following model prevents the IDS from capturing credentials used to authenticate users to the new service or keys to decrypt that communication?

A. Use of OATH between the user and the service and attestation from the company domain
B. Use of active directory federation between the company and the cloud-based service
C. Use of smartcards that store x.509 keys, signed by a global CA
D. Use of a third-party, SAML-based authentication service for attestation


Answer: B. Use of active directory federation between the company and the cloud-based service

Computer Science & Information Technology

You might also like to view...

The arrow in the corner of the item marked 6 indicates that there is a _____ available.

a. hidden tool group b. larger icon c. hidden panel tab d. larger status bar

Computer Science & Information Technology

Draw the undirected graph that is represented by the following:

vertices: 1, 2, 3, 4, 5, 6, 7 edges: (1, 2), (1, 4), (2, 3), (2, 4), (3, 7), (4, 7), (4, 6), (5, 6), (5, 7), (6, 7)

Computer Science & Information Technology

A(n) ____ is a device that can transmit and receive, such as transmitting and receiving signals on a communications cable.

A. repeater B. amplifier C. transmitter D. transceiver

Computer Science & Information Technology

Discuss a weakness of HTTP, and several technologies designed to compensate for this weakness.

What will be an ideal response?

Computer Science & Information Technology