Module 12

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Which of these attacks is the last-resort effort in cracking a stolen password digest file? A. Hybrid B. Mask C. Rule list D. Brute force

D. Brute force

Timur was making a presentation regarding how attackers break passwords. His presentation demonstrated the attack technique that is the slowest yet most thorough attack that is used against passwords. Which of these password attacks did he demonstrate? A. Dictionary attack B. Hybrid attack C. Custom attack D. Brute force attack

D. Brute force attack

Which of the following is the Microsoft version of EAP? A. EAP-MS B. AD-EAP C. PAP-Microsoft D. MS-CHAP

D. MS-CHAP

Fernando is explaining to a colleague how a password cracker works. Which of the following is a valid statement about password crackers? A. Most states prohibit password crackers unless they are used to retrieve a lost password B. Due to their advanced capabilities, they require only a small amount of computing power C. A password cracker attempts to uncover the type of hash algorithm that created the digest because once it is known, the password is broken D. Password crackers differ as to how candidates are created

D. Password crackers differ as to how candidates are created

Which of the following should NOT be stored in a secure password database? A. Iterations B. Password digest C. Salt D. Plaintext password

D. Plaintext password

Which attack uses on or a small number of commonly used passwords to attempt to log in to several different user accounts?

Password spraying

What is a disadvantage of biometric readers?

cost

Which one-time password is event-driven? A. HOTP B. TOTP C. ROTP D. POTP

A. HOTP

_________ biometrics is related to the perception, thought processes, and understanding of the user.

Cognitive

Which human characteristic is NOT used for biometric identification?

Height

How is key stretching effective in resisting password attacks?

It takes more time to generate candidate password digests

Why are dictionary attacks successful?

Users often create passwords from dictionary words

Ilya has been asked to recommend a federation system technology that is an open source federation framework that can support the development of authorization protocols. Which of these technologies would he recommend? A. OAuth B. Open ID C. Shibboleth D. NTLM

A. OAuth

Which of the following is an authentication credential used to access multiple accounts or applications? A. Single sign-on B. Credentialization C. Identification authentication D. Federal login

A. Single sign-on

Which of the following is NOT used for authentication? A. Somewhere you are B. Something you exhibit C. Something you can do D. Something you can find

D. Something you can find

Which of these is NOT a reason that users create weak passwords? A. A lengthy and complex password can be difficult to memorize B. A security policy requires a password to be changed regularly C. Having multiple passwords makes it hard to remember all of them D. The length and complexity required force users to circumvent creating strong passwords

D. The length and complexity required force users to circumvent creating strong passwords

How is the Security Assertion Markup Language (SAML) used?

It allows secure web domains to exchange user authentication and authorization data

Pablo has been asked to look into security keys that have a feature of a key pair that is "burned" into the security key during manufacturing time and is specific to a device model. What feature is this?

attestation

Which of the following is NOT an MFA using a smartphone? A. Authentication app B. Biometric gait analysis C. SMS text message D. Automated phone call

B. Biometric gait analysis

Which of these creates a format of the candidate password to significantly reduce the time needed to crack a password? A. Rainbow B. Mask C. Rule D. Pass the hash

B. Mask


Set pelajaran terkait

Chapter 20: Alteration in Bowel Elimination/Gastrointestinal Disorder

View Set

Bio Chap 13, 14, 15 AP Classroom Questions

View Set

Metodos de Enseñanza Guia Para el Examen

View Set

11HIS () Pearl Harbour -={Causes & Consequences}=-

View Set

U.S. History Quiz 3 - Reconstruction

View Set

Innovation Management Module 7 Trust in AI

View Set