Chapter 11 quiz

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

What type of attack involves using every possible combination of letters, numbers, and characters to create candidate digests that are then matched against those in a stolen digest file?

Brute force

A U.S. Department of Defense (DoD) smart card that is used for identification of active-duty and reserve military personnel along with civilian employees and special contractors is called:

Command Access Card (CAC)

A retina scanner has become the most common type of standard biometrics.

False

Hash algorithms like MD5 and SHA are considered absolutely secure for creating digests because these hashing algorithms are designed to create a digest as strong as possible.

False

Passwords provide strong protection.

False

Voice recognition is identical to speech recognition.

False

What technology is an open source federation framework and supports the development of authorization protocols?

OAuth

The use of one authentication credential to access multiple accounts or applications is referred to as which of the following?

Single Sign On (SSO)

A TOTP changes after a set period.

True

Brute force attacks can be very slow because every character combination must be generated.

True

Keystroke dynamics uses two unique typing variables.

True

Which of the following account lockout policy settings determines the number of failed login attempts before a lockout occurs?

account lockout threshold

Which type of biometrics is based on the perception, thought process, and understanding of the user?

cognitive biometrics

Which term below describes the time it takes for a key to be pressed and then released?

dwell time

What specific type of authentication can be based on where the user is located?

geolocation

What variation of a dictionary attack involves a dictionary attack combined with a brute force attack, and will slightly alter dictionary words by adding numbers to the end of the password, spelling words backward, slightly misspelling words, or including special characters?

hybrid

The use of a single authentication credential that is shared across multiple networks is called:

identity management

What option below represents an example of behavioral biometrics?

keystroke dynamics

What is the main weakness associated with the use of passwords?

limitations in human memory

If a user has more than one type of authentication credential, what type of authentication is being used?

multifactor authentication

What can be used to increase the strength of hashed passwords?

salt

What type of authentication is based on what the user has?

security token

What type of card contains an integrated circuit chip that can hold information, which then can be used as part of the authentication process?

smart card

What kind of biometrics utilizes a person's unique physical characteristics for authentication, such as fingerprints or unique characteristics of a person's face?

standard biometrics

Which of the following is a two-way relationship that is automatically created between parent and child domains in a Microsoft Active Directory forest?

transitive trust


Kaugnay na mga set ng pag-aaral

Types of Life Insurance Policies

View Set

Chapter 19: Normal Newborn: Processes of Adaptation

View Set

Chapter 1: Introduction to Information Technology— Hardware, Software, and Telecommunications

View Set