Chapter 2, Section 2 Practice Questions

¡Supera tus tareas y exámenes ahora con Quizwiz!

Which of the following defines the crossover rate for evaluating biometric systems? A. the point where the number of false positives matches the number of false negatives in a biometric system. B. the rate of people who are given access that should be denied access C. the number of subjects or authentication attempts that can be validated D. the rate of people who are denied access that should be allowed access.

A

Which of the following are examples of single sign-on authentication solutions? (Select two.) A. Kerberos B. biometrics C. SESAME D. digital certificates E. RADIUS F. DIAMETER

A, C

Which of the following advantages can Single Sign-On (SSO) provide? (Select two.) A. the elimination of multiple user accounts and passwords for an individual B. secure remote access C. enhanced password complexity requirements D. access to all authorized resources with a single instance of authentication

A, D

Which of the following are examples of Type II authentication credentials? (Select two.) A. Smart card B. Voice recognition C. Cognitive analysis D. Handwriting analysis E. PIN F. Photo ID

A, F

Which of the following is the strongest form of multi-factor authentication? A. a password, a biometric scan, and a token device B. a password and a biometric scan C. two-factor authentication D. two passwords

A. a password, a biometric scan, and a token device

Which of the following is an example of two-factor authentication? A. a token device and a PIN B. a username and a password C. a pass phrase and a PIN D. a fingerprint and a retina scan

A. a token device and a PIN

Which of the following is stronger than any biometric authentication factor? A. a USB device hosting PKI certificates B. a two-factor authentication C. a dynamic asynchronous token device without a PIN D. a 47-character password

B

Which of the following terms is used to describe an event in which a person is denied access to a system when they should be allowed to enter? A. Error rate B. False negative C. False positive D. False acceptance

B

A device which is synchronized to an authentication server uses which type of authentication? A. smart card B. asynchronous token C. synchronous token D. swipe card

C

The mathematical algorithm used to generate Time-based One-Time Passwords (TOTP) uses a shared secret and a counter to generate unique, one-time passwords. Which event causes the counter to increment when creating TOTP passwords? A. a signal from the TPM chip on the system motherboard B. a value set in a hidden CPU register C. the passage of time D. the creation of a new one-time password

C

The mathematical algorithm used by HMAC-based One-time passwords (HOTP) relies on two type of information to generate a new password based on the previously generated password. Which information is used to generate the new password? (Select two.) A. username B. passphrase C. shared secret D. counter E. password

C, D

Which of the following is an example of three-factor authentication? A. pass phrase, palm scan, voice recognition B. photo ID, smart card, fingerprint C. token device, keystroke analysis, cognitive question D. smart card, digital certificate, PIN

C. token device, keystroke analysis, cognitive question

Which of the following is a hardware device that contains identification information and which can be used to control building access or computer login? A. SSID B. WAP C. Biometric D. Smart card E. Security policy

D

Which of the following authentication methods uses tickets to provide single sign-on? A. PKI B. MS-CHAP C. 802.1x D. Kerberos

D. Kerberos


Conjuntos de estudio relacionados

HESI OBSTETRICS/MATERNITY PRACTICE EXAM

View Set

Statistics Chapter 3 Study Questions

View Set

Chapter 51 & 52 Vision and Hearing

View Set