Authentication 2.2
Which of the following is the strongest form of multi-factor authentication? +Two-factor authentication +A password and a biometric scan +Two passwords +A password, biometric scan, and a token device
+A password, biometric scan, and a token device
Which of the following is an example of two-factor authentication? +A username and a password +A pass phrase and a PIN +A token device and a PIN +A fingerprint and a retina scan
+A token device and a PIN
Which of the following is stronger than any biometric authentication factor? +A USB device hosting PKI certificates +A two-factor authentication +A dynamic asynchronous token device without a PIN +A 47-character password
+A two-factor authentication
Which of the following advantages can Single Sign-On (SSO) provide? (Select two) +Secure remote access +Access to all authorized resources with a single instance of authentication +Enhanced password complexity requirements +The elimination of multiple user accounts and passwords for an individual
+Access to all authorized resources with a single instance of authentication +The elimination of multiple user accounts and passwords for an individual
The mathematical algorithm used by HMAC-based ONE-Time Passwords (HOTP) relies on two types of information to generate a new password based on the previously generated password. Which information is used to generate the new password? (Select two) +Counter +Password +Passphrase +Shared secret +Username
+Counter +Shared Secret
Which of the following terms is used to describe an event in which a person is denied access to a system when they should be allowed to enter? +Error rate +False acceptance +False negative +False positive
+False negative
Which of the following are examples of single sign-on authentication solutions? (Select two) +DIAMETER +RADIUS +Digital Certificates +Kerberos +SESAME +Biometrics
+Kerberos +Sesame
Which of the following authentications methods uses tickets to provide single sign-on? +Kerboros +PKI +802.1x +MS-CHAP
+Kerberos Kerberos grants tickets (also called a security token to authenticated users and to authorized resources. Kerberos uses the following components: +An authentication server (AS) accepts and processes authentication requests +A service server (SS) is a server that provides or holds network resources +A ticket granting server (TGS) grants tickets that are valid for specific resources on specific servers
Which of the following are examples of Type II authentication credentials? (Select two) +Handwriting analysis +PIN +Voice recognition +Smart card +Cognitive question +Photo ID
+Photo ID +Smart card
Which of the following is a hardware device that contains identification information and which can be used to control building access or computer logon? +SSID +Security policy +Biometric +Smart card
+Smart card
A device which is synchronized to an authentication server uses which type of authentication?
+Synchronous token
The mathematical algorithm used to generate Time-based One-Time Passwords (TOTP) uses a shared secret and a counter to generate unique, one-time passwords. Which event causes the counter to increment when creating TOTP passwords? +A signal from the TPM chip on the system mothreboard +A value set in a hidden CPU register +The passage of time +The creation of a new one-time password
+The passage of time
Which of the following defines the crossover rate for evaluating biometric systems? +The rate of people who are denied access that should be allowed access +The rate of people who are given access that should be denied access +The point where the number of false positives matches the number of false negatives in a biometric system +The number of subjects or authentication attempts that can be validated
+The point where the number of false positives matches the number of false negatives in a biometric system
Which of the following is an example of three-factor authentication? +Photo ID, smart card, fingerprint +Pass phrase, palm scan, voice recognition +Smart card, digital certificate, PIN +Token device, keystroke analysis, cognitive question
+Token device, keystroke analysis, cognitive question