A blacklist is a list of discrete entities, such as hosts or applications that have been previously determined to be associated with malicious activity. A whitelist is a list of discrete entities, such as hosts or applications known to be benign. Thresholds set the limits between normal and abnormal behavior of the intrusion detection and prevention systems (IDPS). Program code viewing and editing features are established to see the detection-related programming code in the IDPS.
2. Electronic authentication begins with which of the following?
a. Token
b. Credential
c. Subscriber
d. Credential service provider
3. In the electronic authentication process, who performs the identity proofing?
a. Subscriber
b. Registration authority
c. Applicant
d. Credential service provider
4. In electronic authentication, which of the following provides the authenticated information to the relying party for making access control decisions?
a. Claimant/subscriber
b. Applicant/subscriber
c. Verifier/claimant
d. Verifier/credential service provider
5. In electronic authentication, an authenticated session is established between which of the following?
a. Claimant and the relying party
b. Applicant and the registration authority
c. Subscriber and the credential service provider
d. Certifying authority and the registration authority
6. Under which of the following electronic authentication circumstances does the verifier need to directly communicate with the CSP to complete the authentication activity?
a. Use of a digital certificate
b. A physical link between the verifier and the CSP
c. Distributed functions for the verifier, relying party, and the CSP
d. A logical link between the verifier and the CSP
7. In electronic authentication, who maintains the registration records to allow recovery of registration records?
a. Credential service provider
b. Subscriber
c. Relying party
d. Registration authority
The CSP is responsible for establishing suitable policies for renewal and reissuance of tokens and credentials. During renewal, the usage or validity period of the token and credential is extended without changing the subscriber’s identity or token. During reissuance, a new credential is created for a subscriber with a new identity and/or a new token.