Module 12 Authentication

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Which of these creates a format of the candidate password to significantly reduce the time needed to crack a password?

a. Mask a. Mask b. Overlay c. Pass the hash d. Rainbow

Fernando is explaining to a colleague how a password cracker works. Which of the following is a valid statement about password crackers?

a. Password crackers differ as to how candidates are created. a. Password crackers differ as to how candidates are created. b. Most states prohibit password crackers unless they are used to retrieve a lost password. c. A password cracker attempts to uncover the type of hash algorithm that created the digest because once it is known, the password is broken. d. Due to their advanced capabilities, they require only a small amount of computing power

Which of the following is an authentication credential used to access multiple accounts or applications?

a. Single sign-on a. Single sign-on b. Federal login c. Identification authentication d. Credentialization

Which of the following is NOT an MFA using a smartphone?

d. Biometric gait analysis a. Automated phone call b. Authentication app c. SMS text message d. Biometric gait analysis

Which of these attacks is the last-resort effort in cracking a stolen password digest file?

d. Brute force a. Hybrid b. Rule list c. Mask d. Brute force

Which of the following is NOT used for authentication?

c. Something you can find a. Something you exhibit b. Somewhere you are c. Something you can find d. Something you can do

Which attack uses one or a small number of commonly used passwords to attempt to log in to several different user accounts?

b. Password spraying attack a. Online brute force attack b. Password spraying attack c. Role attack d. Offline brute force attack

Which of these is NOT a reason that users create weak passwords?

b. The length and complexity required force users to circumvent creating strong passwords. a. Having multiple passwords makes it hard to remember all of them. b. The length and complexity required force users to circumvent creating strong passwords. c. A lengthy and complex password can be difficult to memorize. d. A security policy requires a password to be changed regularly.

What is a disadvantage of biometric readers?

b. Cost a. Weight b. Cost c. Speed d. Standards

Which human characteristic is NOT used for biometric identification?

d. Height a. Iris b. Fingerprint c. Retina d. Height

Pablo has been asked to look into security keys that have a feature of a key pair that is "burned" into the security key during manufacturing time and is specific to a device model. What feature is this?

b. Attestation a. Authorization b. Attestation c. Authentication d. Accountability

Which one-time password is event driven?

b. HOTP a. ROTP b. HOTP c. TOTP d. POTP

How is key stretching effective in resisting password attacks?

b. It takes more time to generate candidate password digests. a. It does not require the use of salts. b. It takes more time to generate candidate password digests. c. It requires the use of GPUs. d. The license fees are very expensive to purchase and use it.

Ilya has been asked to recommend a federation system technology that is an open source federation framework that can support the development of authorization protocols. Which of these technologies would he recommend?

b. OAuth a. Shibboleth b. OAuth c. Open ID d. NTLM

Which of the following is the Microsoft version of EAP?

B. MS-CHAP a. MS-CHAP b. PAP-Microsoft c. AD-EAP d. EAP-MS

_____ biometrics is related to the perception, thought processes, and understanding of the user.

a. Cognitive a. Cognitive b. Standard c. Intelligent d. Behavioral

Which of the following should NOT be stored in a secure password database?

c. Plaintext password a. Iterations b. Password digest c. Plaintext password d. Salt

Timur was making a presentation regarding how attackers break passwords. His presentation demonstrated the attack technique that is the slowest yet most thorough attack that is used against passwords. Which of these password attacks did he demonstrate?

d. Brute force attack a. Dictionary attack b. Hybrid attack c. Custom attack d. Brute force attack

Why are dictionary attacks successful?

d. Users often create passwords from dictionary words. a. They link known words together in a "string" for faster processing. b. They use pregenerated rules to speed up the processing. c. Password crackers using a dictionary attack require less RAM than other types of password crackers. d. Users often create passwords from dictionary words.

How is the Security Assertion Markup Language (SAML) used?

a. It allows secure web domains to exchange user authentication and authorization data. a. It allows secure web domains to exchange user authentication and authorization data. b. It serves as a backup to a RADIUS server. c. It is an authenticator in IEEE 802.1x. d. It is no longer used because it has been replaced by LDAP


Set pelajaran terkait

Lecture 12 - Criminal Offenders: Sentencing and Risk Assessment

View Set

9.2 Voice over IP (VoIP) Q + A (Network)

View Set

Ecommerce chapter 7 (Real Ting Set)

View Set

SIE Chapter 5: Investment Banking

View Set

Project Management Chapter 2 Questions

View Set

Transitions Final - All Questions from Lecture Packets

View Set