Authentication 2.2

Ace your homework & exams now with Quizwiz!

Which of the following is the strongest form of multi-factor authentication? +Two-factor authentication +A password and a biometric scan +Two passwords +A password, biometric scan, and a token device

+A password, biometric scan, and a token device

Which of the following is an example of two-factor authentication? +A username and a password +A pass phrase and a PIN +A token device and a PIN +A fingerprint and a retina scan

+A token device and a PIN

Which of the following is stronger than any biometric authentication factor? +A USB device hosting PKI certificates +A two-factor authentication +A dynamic asynchronous token device without a PIN +A 47-character password

+A two-factor authentication

Which of the following advantages can Single Sign-On (SSO) provide? (Select two) +Secure remote access +Access to all authorized resources with a single instance of authentication +Enhanced password complexity requirements +The elimination of multiple user accounts and passwords for an individual

+Access to all authorized resources with a single instance of authentication +The elimination of multiple user accounts and passwords for an individual

The mathematical algorithm used by HMAC-based ONE-Time Passwords (HOTP) relies on two types of information to generate a new password based on the previously generated password. Which information is used to generate the new password? (Select two) +Counter +Password +Passphrase +Shared secret +Username

+Counter +Shared Secret

Which of the following terms is used to describe an event in which a person is denied access to a system when they should be allowed to enter? +Error rate +False acceptance +False negative +False positive

+False negative

Which of the following are examples of single sign-on authentication solutions? (Select two) +DIAMETER +RADIUS +Digital Certificates +Kerberos +SESAME +Biometrics

+Kerberos +Sesame

Which of the following authentications methods uses tickets to provide single sign-on? +Kerboros +PKI +802.1x +MS-CHAP

+Kerberos Kerberos grants tickets (also called a security token to authenticated users and to authorized resources. Kerberos uses the following components: +An authentication server (AS) accepts and processes authentication requests +A service server (SS) is a server that provides or holds network resources +A ticket granting server (TGS) grants tickets that are valid for specific resources on specific servers

Which of the following are examples of Type II authentication credentials? (Select two) +Handwriting analysis +PIN +Voice recognition +Smart card +Cognitive question +Photo ID

+Photo ID +Smart card

Which of the following is a hardware device that contains identification information and which can be used to control building access or computer logon? +SSID +Security policy +Biometric +Smart card

+Smart card

A device which is synchronized to an authentication server uses which type of authentication?

+Synchronous token

The mathematical algorithm used to generate Time-based One-Time Passwords (TOTP) uses a shared secret and a counter to generate unique, one-time passwords. Which event causes the counter to increment when creating TOTP passwords? +A signal from the TPM chip on the system mothreboard +A value set in a hidden CPU register +The passage of time +The creation of a new one-time password

+The passage of time

Which of the following defines the crossover rate for evaluating biometric systems? +The rate of people who are denied access that should be allowed access +The rate of people who are given access that should be denied access +The point where the number of false positives matches the number of false negatives in a biometric system +The number of subjects or authentication attempts that can be validated

+The point where the number of false positives matches the number of false negatives in a biometric system

Which of the following is an example of three-factor authentication? +Photo ID, smart card, fingerprint +Pass phrase, palm scan, voice recognition +Smart card, digital certificate, PIN +Token device, keystroke analysis, cognitive question

+Token device, keystroke analysis, cognitive question


Related study sets

IEM Economics (2nd Edition) Unit 1, Lesson 3 - Traditional and Command

View Set

Module 16: Mood Disorders and Suicide

View Set

BLAW 2 Final - Reasonable Accommodations - Little

View Set

NSG 152 CULTURE & SPIRITUALITY PREPU ?s

View Set

QUIZ 7: Chapter 12: Cardiovascular Disorders

View Set

Night Chapter 1-2 Vocabulary Period 4

View Set

VNSG 1304: Chapter 8 Prep U Questions

View Set

FP513: Module 7.2 Performance Measures

View Set