chapter 11 quiz
Using a rainbow table to crack a password requires three steps: Creation of the table, comparing the table to known hash values, and decrypting the password.
False
The use of what item below involves the creation of a large pregenerated data set of candidate digests?
Rainbow tables
What can be used to increase the strength of hashed passwords?
Salt
A list of the available nonkeyboard characters can be seen in Windows by opening what utility?
charmap.exe
What kind of biometrics utilizes a person's unique physical characteristics for authentication, such as fingerprints or unique characteristics of a person's face?
Standard biometrics
Geolocation is the identification of the location of a person or object using technology, and can be used as part of an authentication method.
True
OpenID is an example of a web-based federated identity management (FIM) system.
True
Token credentials can be revoked at any time by the user without affecting other token credentials issued to other sites.
True
Passwords provide strong protection.
false
What variation of a dictionary attack involves a dictionary attack combined with a brute force attack, and will slightly alter dictionary words by adding numbers to the end of the password, spelling words backward, slightly misspelling words, or including special characters?
hybrid
What type of attack involves an attacker stealing a file containing password digests and comparing the digests with digests created by the attacker?
offline cracking
The most common type of authentication today is a(n) ____________________.
password