Security+ Network Security Fundamentals Chapter 12

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Authentication factors

Five elements that can prove the genuineness of a user: what you know, what you have, what you are, what you do, and where you are.

protocol analyzer

Passwords that are transmitted can be captured by what type of software?

OpenID

Select below the decentralized open-source FIM that does not require specific software to be installed on the desktop:

OAuth

​What federated identity management (FIM) relies on token credentials?

Salt

What can be used to increase the strength of hashed passwords?​

Common Access Card (CAC)

A U.S. Department of Defense (DoD) smart card that is used for identification of active-duty and reserve military personnel along with civilian employees and special contractors is called:

​NTLM (New Technology LAN Manager) hash

A hash used by modern Microsoft Windows operating systems for creating password digests.

Brute Force Attack

A password attack in which every possible combination of letters, numbers, and characters is used to create encrypted passwords that are matched against those in a stolen password file.​

dictionary attack

A password attack that creates encrypted versions of common dictionary words and compares them against those in a stolen password file.​

Hybrid Attack

A password attack that slightly alters dictionary words by adding numbers to the end of the password, spelling words backward, slightly misspelling words, or including special characters.

key stretching

A password hashing algorithm that requires significantly more time than standard hashing algorithms to create the digest.​

Bcrypt

A popular key stretching password hash algorithm​

Salt

A random string that is used in hash algorithms.

password

A secret combination of letters, numbers, and/or characters that only the user should have knowledge of, is known as a:

Token

A small device that can be affixed to a keychain with a window display that shows a code to be used for authentication.

identifier

A token ____________________ is a unique random string of characters that is encrypted to protect the token from being used by unauthorized parties.

dictionary

A(n) ____________________ attack begins with the attacker creating encrypted versions of common dictionary words, and then comparing them against those in a stolen password file.

Passwords provide strong protection.

False

Using a rainbow table to crack a password requires three steps: Creation of the table, comparing the table to known hash values, and decrypting the password.

False

identify

In most systems, a user logging in would be asked to ____________________ herself.

password

The most common type of authentication today is a(n) ____________________.

Identity Management

The use of a single authentication credential that is shared across multiple networks is called:

Single Sign On

The use of one authentication credential to access multiple accounts or applications is referred to as?

Rainbow tables

The use of what item below involves the creation of a large pregenerated data set of candidate digests?

Geolocation is the identification of the location of a person or object using technology, and can be used as part of an authentication method.​

True

OpenID is an example of a web-based federated identity management (FIM) system.​

True

Token credentials can be revoked at any time by the user without affecting other token credentials issued to other sites.

True

Single sign on

Using one authentication credential to access multiple accounts or applications.​

human memory

What is the center of the weakness of passwords?

Standard Biometrics

What kind of biometrics utilizes a person's unique physical characteristics for authentication, such as fingerprints or unique characteristics of a person's face?

OAuth

What technology allows users to share resources stored on one site with a second site without forwarding their authentication credentials to the other site?

offline cracking

What type of attack involves an attacker stealing a file containing password digests and comparing the digests with digests created by the attacker?

Brute Force

What type of attack involves using every possible combination of letters, numbers, and characters to create candidate digests that are then matched against those in a stolen digest file?

Time-based one-time password (TOTP)

What type of one-time password (OTP) changes after a set time period?

hybrid

What variation of a dictionary attack involves a dictionary attack combined with a brute force attack, and will slightly alter dictionary words by adding numbers to the end of the password, spelling words backward, slightly misspelling words, or including special characters?

MD5

Which hashing algorithm below is used with NTLMv2's Hashed Message Authentication Code?

Dwell time

Which term below describes the time it takes for a key to be pressed and then released?

Cognitive Biometrics

Which type of biometrics is based on the perception, thought process, and understanding of the user?

OpenID

____________________ is a decentralized open source FIM that does not require specific software to be installed on the desktop.

charmap.exe

​A list of the available nonkeyboard characters can be seen in Windows by opening what utility?


Ensembles d'études connexes

Econ 3311 - Money & Banking - Practice Exam # 2

View Set

Entrepreneurship I: Final Practice - Unit 4

View Set

the art of public speaking- chapter 7

View Set