TestOut Quiz 2.2
Which of the following is the strongest form of multi-factor authentication?
A password, a biometric scan, and a token device
Which of the following is stronger than any biometric authentication factor?
A two-factor authentication
The mathematical algorithm used by HMAC-based One-Time Passwords (HOTP) relies on two types of information to generate a new password based on the previously generated password. Which information is used to generate the new password? (Select two.)
Counter Shared secret
Which of the following terms is used to describe an event in which a person is denied access to a system when they should be allowed to enter?
False negative
Which of the following authentication methods uses tickets to provide single sign-on?
Kerberos
Which of the following are examples of single sign-on authentication solutions? (Select two.)
SESAME Kerberos
Which of the following are examples of Type II authentication credentials? (Select two.)
Smart card Photo ID
Match the authentication factor types on the left with the appropriate authentication factor on the right. Each authentication factor type can be used more than once. Hardware token
Something you have
Match the authentication factor types on the left with the appropriate authentication factor on the right. Each authentication factor type can be used more than once. Smart card
Something you have
Which of the following defines the crossover rate for evaluating biometric systems?
The point where the number of false positives matches the number of false negatives in a biometric system.
Which of the following is an example of three-factor authentication?
Token device, keystroke analysis, cognitive question
Which of the following advantages can Single Sign-On (SSO) provide? (Select two.)
The elimination of multiple user accounts and passwords for an individual Access to all authorized resources with a single instance of authentication
The mathematical algorithm used to generate Time-based One-Time Passwords (TOTP) uses a shared secret and a counter to generate unique, one-time passwords. Which event causes the counter to increment when creating TOTP passwords?
The passage of time
Which of the following is an example of two-factor authentication?
A token device and a PIN
Which of the following is a hardware device that contains identification information and which can be used to control building access or computer logon?
Smart card
Match the authentication factor types on the left with the appropriate authentication factor on the right. Each authentication factor type can be used more than once. Fingerprint scan
Something you are
Match the authentication factor types on the left with the appropriate authentication factor on the right. Each authentication factor type can be used more than once. Retina scan
Something you are
Match the authentication factor types on the left with the appropriate authentication factor on the right. Each authentication factor type can be used more than once. Voice recognition
Something you are
Match the authentication factor types on the left with the appropriate authentication factor on the right. Each authentication factor type can be used more than once. Typing behaviors
Something you do
Match the authentication factor types on the left with the appropriate authentication factor on the right. Each authentication factor type can be used more than once. PIN
Something you know
Match the authentication factor types on the left with the appropriate authentication factor on the right. Each authentication factor type can be used more than once. Password
Something you know
Match the authentication factor types on the left with the appropriate authentication factor on the right. Each authentication factor type can be used more than once. User name
Something you know
Match the authentication factor types on the left with the appropriate authentication factor on the right. Each authentication factor type can be used more than once. Wi-Fi triangulation
Somewhere you are
A device which is synchronized to an authentication server uses which type of authentication?
Synchronous token