TestOut Quiz 2.2

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Which of the following is the strongest form of multi-factor authentication?

A password, a biometric scan, and a token device

Which of the following is stronger than any biometric authentication factor?

A two-factor authentication

The mathematical algorithm used by HMAC-based One-Time Passwords (HOTP) relies on two types of information to generate a new password based on the previously generated password. Which information is used to generate the new password? (Select two.)

Counter Shared secret

Which of the following terms is used to describe an event in which a person is denied access to a system when they should be allowed to enter?

False negative

Which of the following authentication methods uses tickets to provide single sign-on?

Kerberos

Which of the following are examples of single sign-on authentication solutions? (Select two.)

SESAME Kerberos

Which of the following are examples of Type II authentication credentials? (Select two.)

Smart card Photo ID

Match the authentication factor types on the left with the appropriate authentication factor on the right. Each authentication factor type can be used more than once. Hardware token

Something you have

Match the authentication factor types on the left with the appropriate authentication factor on the right. Each authentication factor type can be used more than once. Smart card

Something you have

Which of the following defines the crossover rate for evaluating biometric systems?

The point where the number of false positives matches the number of false negatives in a biometric system.

Which of the following is an example of three-factor authentication?

Token device, keystroke analysis, cognitive question

Which of the following advantages can Single Sign-On (SSO) provide? (Select two.)

The elimination of multiple user accounts and passwords for an individual Access to all authorized resources with a single instance of authentication

The mathematical algorithm used to generate Time-based One-Time Passwords (TOTP) uses a shared secret and a counter to generate unique, one-time passwords. Which event causes the counter to increment when creating TOTP passwords?

The passage of time

Which of the following is an example of two-factor authentication?

A token device and a PIN

Which of the following is a hardware device that contains identification information and which can be used to control building access or computer logon?

Smart card

Match the authentication factor types on the left with the appropriate authentication factor on the right. Each authentication factor type can be used more than once. Fingerprint scan

Something you are

Match the authentication factor types on the left with the appropriate authentication factor on the right. Each authentication factor type can be used more than once. Retina scan

Something you are

Match the authentication factor types on the left with the appropriate authentication factor on the right. Each authentication factor type can be used more than once. Voice recognition

Something you are

Match the authentication factor types on the left with the appropriate authentication factor on the right. Each authentication factor type can be used more than once. Typing behaviors

Something you do

Match the authentication factor types on the left with the appropriate authentication factor on the right. Each authentication factor type can be used more than once. PIN

Something you know

Match the authentication factor types on the left with the appropriate authentication factor on the right. Each authentication factor type can be used more than once. Password

Something you know

Match the authentication factor types on the left with the appropriate authentication factor on the right. Each authentication factor type can be used more than once. User name

Something you know

Match the authentication factor types on the left with the appropriate authentication factor on the right. Each authentication factor type can be used more than once. Wi-Fi triangulation

Somewhere you are

A device which is synchronized to an authentication server uses which type of authentication?

Synchronous token


Set pelajaran terkait

BIOL 207 Exam 1 Review Questions

View Set

Chapter 10 Physics & Math: Mathematics

View Set

BSC3016 Weeks 1-5 Review Questions

View Set

BIOL2401_ UNIT 5 - CRANIAL DIVISION OF NERVOUS SYSTEM

View Set

Chapter 2 Ethical Hacking Testout

View Set

Section 5: Quiz 61 - Information System Attack Methods and Techniques

View Set

Nutrition Exam 3: Chapter 10 - Water Soluble Vitamins

View Set