Ch12

Ace your homework & exams now with Quizwiz!

Using a rainbow table to crack a password requires three steps: Creation of the table, comparing the table to known hash values, and decrypting the password.

False

What technology allows users to share resources stored on one site with a second site without forwarding their authentication credentials to the other site?

OAuth

Select below the decentralized open-source FIM that does not require specific software to be installed on the desktop:

OpenID

The use of what item below involves the creation of a large pregenerated data set of candidate digests?

Rainbow tables

What can be used to increase the strength of hashed passwords?​

Salt

​What federated identity management (FIM) relies on token credentials?

​OAuth

​What type of one-time password (OTP) changes after a set time period?

​Time-based one-time password (TOTP)

What type of attack involves using every possible combination of letters, numbers, and characters to create candidate digests that are then matched against those in a stolen digest file?

Brute force

Which type of biometrics is based on the perception, thought process, and understanding of the user?

Cognitive biometrics

A U.S. Department of Defense (DoD) smart card that is used for identification of active-duty and reserve military personnel along with civilian employees and special contractors is called:

Common Access Card (CAC)

Passwords provide strong protection.

False

The use of a single authentication credential that is shared across multiple networks is called:

Identity management

​Which hashing algorithm below is used with NTLMv2's Hashed Message Authentication Code?

MD5

The use of one authentication credential to access multiple accounts or applications is referred to as?

Single Sign On

What kind of biometrics utilizes a person's unique physical characteristics for authentication, such as fingerprints or unique characteristics of a person's face?

Standard biometrics

Geolocation is the identification of the location of a person or object using technology, and can be used as part of an authentication method.​

True

OpenID is an example of a web-based federated identity management (FIM) system.​

True

Token credentials can be revoked at any time by the user without affecting other token credentials issued to other sites.

True

What is the center of the weakness of passwords?

human memory

What variation of a dictionary attack involves a dictionary attack combined with a brute force attack, and will slightly alter dictionary words by adding numbers to the end of the password, spelling words backward, slightly misspelling words, or including special characters?

hybrid

What type of attack involves an attacker stealing a file containing password digests and comparing the digests with digests created by the attacker?

offline cracking

A secret combination of letters, numbers, and/or characters that only the user should have knowledge of, is known as a:

password

Passwords that are transmitted can be captured by what type of software?

protocol analyzer


Related study sets

Brain Structure and Nervous System

View Set

Chapter: 44 Written Communication and Mail

View Set

4.01 workshop: independent, dependent, and noun clauses

View Set

HESI & NCLEX PASSPOINT: Fluid & Electrolyte Balance

View Set