Chapter 11
Timur was making a presentation regarding how attackers break passwords. His presentation demonstrated the attack technique that is the slowest yet most thorough attack that is used against passwords. Which of these password attacks did he demonstrate?
Brute force attack
_____ biometrics is related to the perception, thought processes, and understanding of the user.
Cognitive
A U.S. Department of Defense (DoD) smart card that is used for identification of active-duty and reserve military personnel along with civilian employees and special contractors is called:
Common Access Card (CAC)
What is a disadvantage of biometric readers?
Cost
Which term below describes the time it takes for a key to be pressed and then released?
Dwell time
A retina scanner has become the most common type of standard biometrics.
False
Hash algorithms like MD5 and SHA are considered secure for creating digests because these hashing algorithms are designed to create a digest as strong as possible.
False
Passwords provide strong protection.
False
Voice recognition is identical to speech recognition.
False
Which type of password attack is a more targeted brute force attack that uses placeholders for characters in certain positions of the password?
Mask attack
What type of card contains an integrated circuit chip that can hold information, which then can be used as part of the authentication process?
Smart card
A TOTP changes after a set period.
True
A hardware security token is typically a small device with a window display.
True
Brute force attacks can be very slow because every character combination must be generated.
True
Keystroke dynamics uses two unique typing variables.
True
Most password attacks today are an offline attack.
True
Open ID Connect is an Authentication protocol that can be used in OAuth 2.0 as a standard means to obtain user identity.
True
Which authentication factor is based on a unique talent that a user possesses?
What you do
A list of the available non-keyboard characters can be seen in Windows by opening what utility?
charmap.exe
What is the main weakness associated with the use of passwords?
Human memory
What federated identity management (FIM) relies on token credentials?
OAuth
Which of the following are key stretching password hash algorithms?
PBKD2 and bcrypt
Which of the following options prevents a logon after a set number of failed logon attempts within a specified period and can also specify the length of time that the lockout is in force?
Password lockout
Which of the following should NOT be stored in a secure password database?
Plaintext password
Each of the following accounts should be prohibited EXCEPT:
Privileged accounts
What type of authentication is based on what the user has?
Security token
The use of one authentication credential to access multiple accounts or applications is referred to as which of the following?
Single Sign On
What specific type of authentication can be based on where the user is located?
Geolocation
Which one-time password is event-driven?
HOTP
Which of these is NOT a reason why users create weak passwords?
Most sites force users to create weak passwords even though they do not want to.
If a user has more than one type of authentication credential, what type of authentication is being used?
Multifactor authentication
Ilya has been asked to recommend a federation system technology that is an open source federation framework that can support the development of authorization protocols. Which of these technologies would he recommend?
OAuth