Authentication (Unit 12 Review) - [Network Security]

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Which of the following statements describe the function of a Trusted Platform Module (TPM)? [Choose all that apply]

1. Storage of encryption keys 2. Storage of certificates 3. Management of encryption keys 4. Perform encryption and decryption process

Multi-factor authentication involves how many minimum methods to authenticate a user?

2

How many entities are involved in the 802.1x authentication process?

3 (802.1X authentication involves three candidates or parties: - Client: Device that needs to access the network and its resources. The client shares the credentials based on which the authentication takes place. - Authenticator: Entity that creates the connection between the client and the authentication server. This can be a switch in case of a network or a Wireless Access Point (WAP) in a wireless network. It does not verify the client's credentials. It only acts as a postman to forward the credentials to the authentication server. Only after the authentication server approves the request and authorizes the client, the authenticator allows the client to access the requested resources. - Authentication Server: Entity that authenticates a request. Once the request is received, it tells the authenticator if the access is allowed or denied.)

Which of the following protocol uses port-based authentication?

802.1X

Pablo has been asked to look into security keys that have a feature of a key pair that is "burned" into the security key during manufacturing time and is specific to a device model. What feature is this?

Attestation

Which of the following authentication method can use location to authenticate a user?

Attribute-based Access Control (ABAC)

Which of the following is NOT an MFA using a smartphone?

Biometric gait analysis

Which of these attacks is the last-resort effort in cracking a stolen password digest file?

Brute force

Timur was making a presentation regarding how attackers break passwords. His presentation demonstrated the attack technique that is the slowest yet most thorough attack that is used against passwords. Which of these password attacks did he demonstrate?

Brute force attack

When implementing biometric security, you want to allow the maximum number of legitimate users while blocking imposters. Which of the choices descibes the aggregate rate of acceptance and rejection?

CER

While reviewing several certificate-based authentication methods, which choice can support event driven HOTP?

Cell phones

_____ biometrics is related to the perception, thought processes, and understanding of the user.

Cognitive

What is a disadvantage of biometric readers?

Cost

Which of the following functions can be performed by a hardware security module (HSM)? [Choose all that apply]

Encryption Keys Management Key Exchange Encryption and Decryption Cryptographic function offloading from a server

Which of the following type of scanner scans for features, such as the shape, size, and position of the ear, nose, and eyes?

Facial

Which of the following is considered as the root of the Active Directory hierarchy?

Forest (Active Directory is a central repository that contains objects, such as users, groups, and computers. Active Directory maintains central control of these objects within a domain. You can configure sites, domains, forests, and organizational units (OU) to manage the Active Directory. In the Active Directory hierarchy, the forest is always the root. A forest can have one or more domains. A domain has distinct security boundaries. You can have sites containing one or more domains, or a domain can contain multiple sites. If your organization has multiple departments, then you can create separate OUs for each department.)

Which one-time password is event driven?

HOTP

Which human characteristic is NOT used for biometric identification?

Height

How is the Security Assertion Markup Language (SAML) used?

It allows secure web domains to exchange user authentication and authorization data.

How is key stretching effective in resisting password attacks?

It takes more time to generate candidate password digests.

Which of the following is the Microsoft version of EAP?

MS-CHAP

Which of these creates a format of the candidate password to significantly reduce the time needed to crack a password?

Mask

Quiz

Module 12 Authentication

Live Virtual Machine Lab 12.1

Module 12 Authentication and Authorization Implementation Techniques

Live Virtual Machine Lab 12.2

Module 12 Authentication and Authorization Solutions

Simulation Lab 12.1

Module 12 Configure Sign-in Options Using Cognitive Biometrics

Ilya has been asked to recommend a federation system technology that is an open source federation framework that can support the development of authorization protocols. Which of these technologies would he recommend?

OAuth

You need to identify a federated development technology to be used to support SSO. Choose the technology that would NOT be used from those provided.

PBKDF2

Fernando is explaining to a colleague how a password cracker works. Which of the following is a valid statement about password crackers?

Password crackers differ as to how candidates are created.

Which of the following is required for two-factor authentication? [Choose all that apply]

Password key Password Smart card

Which attack uses one or a small number of commonly used passwords to attempt to log in to several different user accounts?

Password spraying attack

Which of the following should NOT be stored in a secure password database?

Plaintext password

Which of the following is an authentication credential used to access multiple accounts or applications?

Single sign-on

Which of the following is NOT used for authentication?

Something you can find

On examining the methods of standard biometric authentication available, which would NOT be considered?

Speech recognition

Which of these is NOT a reason that users create weak passwords?

The length and complexity required force users to circumvent creating strong passwords.

Why are dictionary attacks successful?

Users often create passwords from dictionary words.

Which of the following factor is critical in the Gait analysis?

Way of walking

On inspecting the methods of standard biometric authentication identification available be which physical attribute would NOT be considered?

Weight


Set pelajaran terkait

Physics Chapter 22 Electricity and Magnetism: Terms, Practice Homework, Practice Test

View Set

HLTH 2400 Self-Determination Theory: A Theory of Human Motivation

View Set

BIO 168 Chapter 8: Joints and Movement

View Set

HN-Chapter 12 Inflammation/Wounds

View Set

Nutrition Exam 3 Coursepoint questions

View Set

Chapter 27 Business Law All Forms of Partnership

View Set

Chapter 13 - The Nature of Gases

View Set

Chapter 9 - Managing Human Resources and Diversity

View Set