Chapter 11

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Timur was making a presentation regarding how attackers break passwords. His presentation demonstrated the attack technique that is the slowest yet most thorough attack that is used against passwords. Which of these password attacks did he demonstrate?

Brute force attack

_____ biometrics is related to the perception, thought processes, and understanding of the user.

Cognitive

A U.S. Department of Defense (DoD) smart card that is used for identification of active-duty and reserve military personnel along with civilian employees and special contractors is called:

Common Access Card (CAC)

What is a disadvantage of biometric readers?

Cost

Which term below describes the time it takes for a key to be pressed and then released?

Dwell time

A retina scanner has become the most common type of standard biometrics.

False

Hash algorithms like MD5 and SHA are considered secure for creating digests because these hashing algorithms are designed to create a digest as strong as possible.

False

Passwords provide strong protection.

False

Voice recognition is identical to speech recognition.

False

Which type of password attack is a more targeted brute force attack that uses placeholders for characters in certain positions of the password?

Mask attack

What type of card contains an integrated circuit chip that can hold information, which then can be used as part of the authentication process?

Smart card

A TOTP changes after a set period.

True

A hardware security token is typically a small device with a window display.

True

Brute force attacks can be very slow because every character combination must be generated.

True

Keystroke dynamics uses two unique typing variables.

True

Most password attacks today are an offline attack.

True

Open ID Connect is an Authentication protocol that can be used in OAuth 2.0 as a standard means to obtain user identity.

True

Which authentication factor is based on a unique talent that a user possesses?

What you do

A list of the available non-keyboard characters can be seen in Windows by opening what utility?

charmap.exe

What is the main weakness associated with the use of passwords?

Human memory

What federated identity management (FIM) relies on token credentials?

OAuth

Which of the following are key stretching password hash algorithms?

PBKD2 and bcrypt

Which of the following options prevents a logon after a set number of failed logon attempts within a specified period and can also specify the length of time that the lockout is in force?

Password lockout

Which of the following should NOT be stored in a secure password database?

Plaintext password

Each of the following accounts should be prohibited EXCEPT:

Privileged accounts

What type of authentication is based on what the user has?

Security token

The use of one authentication credential to access multiple accounts or applications is referred to as which of the following?

Single Sign On

What specific type of authentication can be based on where the user is located?

Geolocation

Which one-time password is event-driven?

HOTP

Which of these is NOT a reason why users create weak passwords?

Most sites force users to create weak passwords even though they do not want to.

If a user has more than one type of authentication credential, what type of authentication is being used?

Multifactor authentication

Ilya has been asked to recommend a federation system technology that is an open source federation framework that can support the development of authorization protocols. Which of these technologies would he recommend?

OAuth


Set pelajaran terkait

ACCT 304 Exam #2 (EPS and Leases)

View Set

Chapter 62: Musculoskeletal Trauma and Orthopedic Surgery

View Set

IT0103 S1-S2 (Finals Reviewer) Canvas

View Set

Giddens Concepts Review (modules 3 and 4)

View Set

Hoofdstuk 6 Nederlands in gang (2): mogen/willen/moeten/kunnen/zullen

View Set