1600 Flashcards

1
Q

Which of the following attacks on passwords requires the attacker to have physical access to the computer to insert a USB flash drive? A. resetting B. capturing C. social engineering D. online guessing

A

A. resetting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a hybrid attack? A. an attack that combines a dictionary attack with an online guessing attack B. a brute force attack that uses special tables C. an attack that slightly alters dictionary words D. an attack that uses both automated and user input

A

C. an attack that slightly alters dictionary words

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Each of the following is a step in creating a strong password except __________. A. use a short password so the computer can process it more quickly B. avoid using phonetic words C. do not use sequences D. do not use personal information

A

A. use a short password so the computer can process it more quickly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A token code is valid ___________. A. for as long as it appears on the device B. for up to one hour C. only for the user who possesses the device D. if it is longer than eight characters

A

A. for as long as it appears on the device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A token system that requires the user to enter the code along with a PIN is called a __________. A. single-factor authentication system B. dual-prong verification system C. multifactor authentication system D. token-passing authentication system

A

C. multifactor authentication system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A __________ is a U.S. Department of Defense (DoD) smart card that is used for identification for active-duty and reserve military personnel. A. Personal Identity Verification (PIV) card B. Government Smart Card (GSC) C. Secure ID Card (SIDC) D. Common Access Card (CAC)

A

D. Common Access Card (CAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Keystroke dynamics is an example of ___________ biometrics. A. resource B. cognitive C. adaptive D. behavioral

A

D. behavioral

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Creating a pattern of when and from where a user accesses a remote Web account is an example of ___________. A. Time-Location Resource Monitoring (TLRM) B. keystroke dynamics C. cognitive biometrics D. computer footprinting

A

D. computer footprinting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

___________ is a decentralized open source FIM that does not require specific software to be installed on the desktop. A. SSO Login Resource (SSO-LR) B. Windows CardSpace C. OpenID D. Windows Live ID

A

C. OpenID

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following human characteristics cannot be used for biometric identification? A. face B. weight C. fingerprint D. retina

A

B. weight

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

__________ biometrics is related to the perception - thought processes - and understanding of the user. A. Standard B. Intelligent C. Behavioral D. Cognitive

A

D. cognitive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Using one authentication credential to access multiple accounts or application is __________. A. credentialization B. identification authentication C. single sign-on D. federal login

A

C. single sign-on

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A disadvantage of biometric readers is __________. A. speed B. size C. cost D. standards

A

C. cost

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which single sign-on (SSO) technology depends on tokens? A. OAuth B. CardSpace C. OpenID D. All SSO technologies use tokens

A

A. OAuth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Why should the account lockout threshold not be set too low? A. it could decrease calls to the help desk B. because the network administrator would then have to manually reset the account C. so the user would not have to wait too long to have their password reset. D. it could result in denial of service (DoS) attacks

A

D. it could result in denial of service (DoS) attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following is not a flaw in standard operating systems? A. operating systems by default use the principle of least privilege. B. operating systems are complex programs with millions of liens of code that make vulnerabilities extremely difficult to recognize C. operating systems do not isolate applications from each another - so one application that is compromised can impact the entire computer D. operating systems cannot create a trusted path between users and applications

A

A. operating systems by default use the principle of least privilege.

17
Q

An operating system that is designed to be secure by controlling critical parts of it to limit access from attackers and administrators is a __________. A. secure OS B. trustworthy OS C. managed OS D. trusted OS

A

D. trusted OS

18
Q

Which technique would prevent an attacker from China from logging into a user’s account at 4:00 am? A. computer footprinting B. openAuthoriztion C. cognitive biometrics D. Internet throttling

A

A. computer footprinting