Quiz 12
_____ biometrics is related to the perception, thought processes, and understanding of the user.
Cognitive
___biometrics is related to the perception, thought process, and understanding of the user.
Cognitive
Which of these is a U.S. Department of Defense(DoD) smart card that is used for identification of active duty and reserve military personnel?
Common access card(CAC)
Single sign-on allows users to authenticate across multiple networks and requires what to function?
FIM
Which one-time password is event-driven?
HOTP
The use of a single authentication credential that is shared across multiple networks is called:
Identity management
Why should the account lockout threshold not be set to low?
It could result in denial of service (DoS) attacks
Why should the account lockout threshold not be set too low?
It could result in denial of service (DoS) attacks.
How is key stretching effective in resisting password attacks?
It takes more time to generate candidate password digests.
Why would an administrator resort to key stretching algorithms as opposed to general-purpose algorithms such as MD5?
Key stretching algorithms are slower
Which of these algorithms is the weakest for creating password digests?
LM (LAN Manager) hash
What is a token system that requires the user to enter the code along with a pin called?
Multifactor authentication system
What technology allows users to share resources stored on one site with a second site without forwarding their authentication credentials to the other site?
OAuth
Which single sign-on (SSO) technology depends on tokens?
OAuth
which single sign-on(SSO) technology depends on tokens
OAuth
Which of these is a decentralized open-source FIM that does not require specific software to be installed on the desktop?
OpenID
Which of the following is a true statement about salts?
Salts can change identical passwords
Which of the following authentication methods are prone to errors?
Standard biometrics
Which of these is NOT a characteristic of a weak password?
a long password
What is a hybrid attack?
an attack that slightly alters dictionary words
Keystroke dynamics is an example of which type of biometrics?
behavioral
What is a disadvantage of biometric readers
cost
What is a disadvantage of biometric readers?
cost
A TOTP token code is valid _____.
for as long as it appears on the device
A TOTP token code is valid____
for as long as it appears on the device
Creating a pattern of where a user accesses a remote web account is an example of _____.
geolocation
What is a token system that requires the user to enter the code along with a PIN called?
multifactor authentication system
Which attack is an attempt to compare a known digest to an unknown digest?
pre-image attack
Using one authentication credential to access multiple accounts or application is known as ____
single sign-on
Which human characteristic is NOT used for biometric identificaiton?
weight
Which authentication factor is based on a unique talent that a user possesses?
what you do