Term
|
Definition
the process of confirming a users identity, usually by requiring the user to supply some sort of token, ie. password or certificate |
|
|
Term
|
Definition
No additional role services required Best used for: Internet web or FTP sites that are open to the public with no access restrictions |
|
|
Term
|
Definition
The built in anonymous user account in IIS7 which is a member of the group IIS_IUSRS By default IIS7 authenticates anonymous users with a specifically created account |
|
|
Term
|
Definition
Root directory of the default web site where the user and group NTFS permissions are stored. |
|
|
Term
Is the most secure of the three traditional challenge/response authentication methods supported by IIS7 |
|
Definition
|
|
Term
What are the 2 authentication protocols supported by IIS7 Windows authentication module? |
|
Definition
|
|
Term
|
Definition
A challenge/response authentication protocol used by windows computers that are NOT members of an Active Directory domain. |
|
|
Term
|
Definition
A ticket based authentication protocol used by Windows computers that ARE members of an Active Directory domain. |
|
|
Term
This is designed for use with intranet web servers in an Active Directory environment. |
|
Definition
|
|
Term
Digest Authentication works through _________ and ________ because it actually transmits passwords over the network. The protocol protects the passwords using ______ encryption. |
|
Definition
firewalls and proxy servers MD5 |
|
|
Term
To connect to the server using SSL, the URL or link must explicitly contain what prefix? |
|
Definition
|
|
Term
When typing a web address such as www.sitename.com what prefix does the browser automatically use? |
|
Definition
|
|
Term
A______________ is an electronic credential issued by a __________________ which confirms the identity of the party to which it was issued. |
|
Definition
Digital Certificate Certification Authority |
|
|
Term
Participants are issued two keys, one public and one private. The private key is kept a secret, while the public key is freely available in the digital certificate. Data on the private key can only be decrypted using the public key and vice versa. Any data that the client encrypts using the severs public key can only be decrypted and read by the server. What is this called? |
|
Definition
Public Key Infrastructure |
|
|