A blacklist is a list of discrete entities, such as hosts or applications that have been previously determined to be associated with malicious activity. A whitelist is a list of discrete entities, such as hosts or applications known to be benign. Thresholds set the limits between normal and abnormal behavior of the intrusion detection and prevention systems (IDPS). Program code viewing and editing features are established to see the detection-related programming code in the IDPS.
2. Electronic authentication begins with which of the following?
a.
Tokenb.
Credentialc.
Subscriberd.
Credential service provider3. In the electronic authentication process, who performs the identity proofing?
a.
Subscriberb.
Registration authorityc.
Applicantd.
Credential service provider4. In electronic authentication, which of the following provides the authenticated information to the relying party for making access control decisions?
a.
Claimant/subscriberb.
Applicant/subscriberc.
Verifier/claimantd.
Verifier/credential service provider5. In electronic authentication, an authenticated session is established between which of the following?
a.
Claimant and the relying partyb.
Applicant and the registration authorityc.
Subscriber and the credential service providerd.
Certifying authority and the registration authority6. Under which of the following electronic authentication circumstances does the verifier need to directly communicate with the CSP to complete the authentication activity?
a.
Use of a digital certificateb.
A physical link between the verifier and the CSPc.
Distributed functions for the verifier, relying party, and the CSPd.
A logical link between the verifier and the CSP7. In electronic authentication, who maintains the registration records to allow recovery of registration records?
a.
Credential service providerb.
Subscriberc.
Relying partyd.
Registration authorityThe CSP is responsible for establishing suitable policies for renewal and reissuance of tokens and credentials. During renewal, the usage or validity period of the token and credential is extended without changing the subscriber’s identity or token. During reissuance, a new credential is created for a subscriber with a new identity and/or a new token.