Quiz 2: Identification and Authentication

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

What do we call the process by which the client authenticates to the server and the server authenticates to the client? Multifactor Authentication Identification Verification Mutual Authentication Differential Authentication

Mutual Authentication

Define universality

A chosen biometric characteristic can be found in the majority of those who will use the system

Using the same password for all of your accounts is an acceptable practice provided you have a complex and hard to remember password. True or false

False

When we use an authentication mechanism that includes more than one factor, this is known as biometric authentication. True or false

False

Define circumvention

How easily a chosen biometric characteristic can be falsified

Define collectability

How easy a chosen biometric characteristic is to acquire

Define permanence

How well a chosen biometric characteristic resists change

Define acceptability

How willing users will be to utilize a chosen biometric characteristic as a form of authenticaton

_____ is the claim of that someone or something is, and _____ established whether or not this claim is true.

Identification and Authentication

Define performance

Judges how well a given system functions

When performing authentication, a number of factors can be used. The main factors are something you _____, something you _____, something you _____, something you _____, and where _____ _____

Know, Are, Have, Do, You Are

Define uniqueness

The measure of how distinct a chosen biometric characteristic among individuals

A brute force attack involves trying every possible combination of characters that the password could be composed of, in sequence, until they have all been tried. True or false

True

It is a bad idea to write your password down and keep it at your desk, under your keyboard where no one can see it. True or false

True

Using multiple factors provides a much stronger authentication mechanism that we might have otherwise. True or false

True

You are assigned a key fob that allows you to access the conference room in your organizations satellite office, this factor of authentication is referred to as _____.

hardware token


Ensembles d'études connexes

Chapter 14 Assessing Skin, Hair, and Nails

View Set

Understanding Procedural Coding Chapter 17 Nervous System

View Set

ATI Pharmacology made easy 4.0- Infection

View Set

SPEA V-185 MGMT OF PUBLC PROB & SOLUTIONS: exam 2 study guide

View Set

adulthood and aging exam 2 Chapter 8, Personality

View Set

Superficial Structures: Prostate

View Set