Which process is being described by the following steps? 1. A user logs into domain A using a PKI certificate on a smartcard protected by an 8-digit PIN. 2. The credential is cached by the authenticating server in domain

A.
3. Later, the user attempts to access a resource in domain B.
4. A request to the original authenticating server is initiated to somehow attest to the resource server in the second domain that the user is in fact who they claim to be.

A. HTML
B. SAML
C. SOAP
D. IPsec


B
Explanation: The steps provided describe the operation of SAML.

Exam 3

Computer Science & Information Technology

You might also like to view...

Answer the following statements true (T) or false (F)

1. A value is stored in a variable with an assignment statement. 2. Programming style refers to the way a programmer uses elements such as identifiers, spaces, and blank lines. 3. When typing your source code into the computer, you should be careful since most of your C++ instructions, header files, and variable names are case sensitive. 4. In C++ you are required to name your variables so they indicate the purpose they will be used for. 5. Escape sequences are always stored internally as a single character.

Computer Science & Information Technology

The ________ command allows the user to find, and then substitute, word or phrases within the document

A) Scan B) Search C) Substitute D) Replace

Computer Science & Information Technology

________ scrolling enables you to move through two documents at the same time

Fill in the blank(s) with correct word

Computer Science & Information Technology

A _____ is a modified version of a virus that is produced by the virus's author or another person by amending the original virus code.

a. rootkit b. variant c. Trojan horse d. worm

Computer Science & Information Technology