Quiz 12

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

_____ biometrics is related to the perception, thought processes, and understanding of the user.

Cognitive

___biometrics is related to the perception, thought process, and understanding of the user.

Cognitive

Which of these is a U.S. Department of Defense(DoD) smart card that is used for identification of active duty and reserve military personnel?

Common access card(CAC)

Single sign-on allows users to authenticate across multiple networks and requires what to function?

FIM

Which one-time password is event-driven?

HOTP

The use of a single authentication credential that is shared across multiple networks is called:

Identity management

Why should the account lockout threshold not be set to low?

It could result in denial of service (DoS) attacks

Why should the account lockout threshold not be set too low?

It could result in denial of service (DoS) attacks.

How is key stretching effective in resisting password attacks?

It takes more time to generate candidate password digests.

Why would an administrator resort to key stretching algorithms as opposed to general-purpose algorithms such as MD5?

Key stretching algorithms are slower

Which of these algorithms is the weakest for creating password digests?

LM (LAN Manager) hash

What is a token system that requires the user to enter the code along with a pin called?

Multifactor authentication system

What technology allows users to share resources stored on one site with a second site without forwarding their authentication credentials to the other site?

OAuth

Which single sign-on (SSO) technology depends on tokens?

OAuth

which single sign-on(SSO) technology depends on tokens

OAuth

Which of these is a decentralized open-source FIM that does not require specific software to be installed on the desktop?

OpenID

Which of the following is a true statement about salts?

Salts can change identical passwords

Which of the following authentication methods are prone to errors?

Standard biometrics

Which of these is NOT a characteristic of a weak password?

a long password

What is a hybrid attack?

an attack that slightly alters dictionary words

Keystroke dynamics is an example of which type of biometrics?

behavioral

What is a disadvantage of biometric readers

cost

What is a disadvantage of biometric readers?

cost

A TOTP token code is valid _____.

for as long as it appears on the device

A TOTP token code is valid____

for as long as it appears on the device

Creating a pattern of where a user accesses a remote web account is an example of _____.

geolocation

What is a token system that requires the user to enter the code along with a PIN called?

multifactor authentication system

Which attack is an attempt to compare a known digest to an unknown digest?

pre-image attack

Using one authentication credential to access multiple accounts or application is known as ____

single sign-on

Which human characteristic is NOT used for biometric identificaiton?

weight

Which authentication factor is based on a unique talent that a user possesses?

what you do


संबंधित स्टडी सेट्स

EMT Basic - Chapters 7 & 9 (Quiz 5)

View Set

Chapter 11 short answers (+ extra)

View Set

Econ Test 2 Old quiz/test questions

View Set