An organization that utilizes single sign-on has a primary domain and three secondary domains. Which of the following statements will be true of this scenario? (Choose two.)

A. The secondary domains need to trust the primary domain to protect the authentication credentials used to verify the end user identity to the secondary domains for authorized use.
B. The primary domain needs to trust the secondary domains to protect the authentication credentials used to verify the end user identity to the primary domain for authorized use.
C. The secondary domains will assert the identity and authentication credentials to the primary domain on behalf of the user.
D. The primary domain will assert the identity and authentication credentials to the secondary domains on behalf of the user.


A, D
Explanation: Significant security aspects of the single sign-on model are:
• The secondary domains have to trust the primary domain to:
o Correctly assert the identity and authentication credentials of the end user
o Protect the authentication credentials used to verify the end user identity to the secondary domain from unauthorized use
• The authentication credentials have to be protected when transferred between the primary and secondary domains against threats arising from interception or eavesdropping leading to possible masquerade attacks.

Computer Science & Information Technology

You might also like to view...

The RD connection broker arranges a user connection to an appropriate host.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

WAN Network Topology

![15386|615x360](upload://hYd8q7kV0e4Md3yFV5ODCCvExWb.jpeg) Background/Scenario Packet Tracer allows the design and creation of a simulated networking topology. In this activity, youare presented with a simplified topology to observe packet flow. You will explore how packets travel through the network using the simulation mode in Packet Tracer. You will also observe the changes in packet flow when there is a change in the network topology.

Computer Science & Information Technology

When saving a form containing macros, you save it as ________

A) Word Macro-Enabled Template B) Word Template C) Word XML Document D) Rich Text Format

Computer Science & Information Technology

A GUI object must be selected in order to delete it.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology