1600 Flashcards
Which of the following attacks on passwords requires the attacker to have physical access to the computer to insert a USB flash drive? A. resetting B. capturing C. social engineering D. online guessing
A. resetting
What is a hybrid attack? A. an attack that combines a dictionary attack with an online guessing attack B. a brute force attack that uses special tables C. an attack that slightly alters dictionary words D. an attack that uses both automated and user input
C. an attack that slightly alters dictionary words
Each of the following is a step in creating a strong password except __________. A. use a short password so the computer can process it more quickly B. avoid using phonetic words C. do not use sequences D. do not use personal information
A. use a short password so the computer can process it more quickly
A token code is valid ___________. A. for as long as it appears on the device B. for up to one hour C. only for the user who possesses the device D. if it is longer than eight characters
A. for as long as it appears on the device
A token system that requires the user to enter the code along with a PIN is called a __________. A. single-factor authentication system B. dual-prong verification system C. multifactor authentication system D. token-passing authentication system
C. multifactor authentication system
A __________ is a U.S. Department of Defense (DoD) smart card that is used for identification for active-duty and reserve military personnel. A. Personal Identity Verification (PIV) card B. Government Smart Card (GSC) C. Secure ID Card (SIDC) D. Common Access Card (CAC)
D. Common Access Card (CAC)
Keystroke dynamics is an example of ___________ biometrics. A. resource B. cognitive C. adaptive D. behavioral
D. behavioral
Creating a pattern of when and from where a user accesses a remote Web account is an example of ___________. A. Time-Location Resource Monitoring (TLRM) B. keystroke dynamics C. cognitive biometrics D. computer footprinting
D. computer footprinting
___________ is a decentralized open source FIM that does not require specific software to be installed on the desktop. A. SSO Login Resource (SSO-LR) B. Windows CardSpace C. OpenID D. Windows Live ID
C. OpenID
Which of the following human characteristics cannot be used for biometric identification? A. face B. weight C. fingerprint D. retina
B. weight
__________ biometrics is related to the perception - thought processes - and understanding of the user. A. Standard B. Intelligent C. Behavioral D. Cognitive
D. cognitive
Using one authentication credential to access multiple accounts or application is __________. A. credentialization B. identification authentication C. single sign-on D. federal login
C. single sign-on
A disadvantage of biometric readers is __________. A. speed B. size C. cost D. standards
C. cost
Which single sign-on (SSO) technology depends on tokens? A. OAuth B. CardSpace C. OpenID D. All SSO technologies use tokens
A. OAuth
Why should the account lockout threshold not be set too low? A. it could decrease calls to the help desk B. because the network administrator would then have to manually reset the account C. so the user would not have to wait too long to have their password reset. D. it could result in denial of service (DoS) attacks
D. it could result in denial of service (DoS) attacks
Which of the following is not a flaw in standard operating systems? A. operating systems by default use the principle of least privilege. B. operating systems are complex programs with millions of liens of code that make vulnerabilities extremely difficult to recognize C. operating systems do not isolate applications from each another - so one application that is compromised can impact the entire computer D. operating systems cannot create a trusted path between users and applications
A. operating systems by default use the principle of least privilege.
An operating system that is designed to be secure by controlling critical parts of it to limit access from attackers and administrators is a __________. A. secure OS B. trustworthy OS C. managed OS D. trusted OS
D. trusted OS
Which technique would prevent an attacker from China from logging into a user’s account at 4:00 am? A. computer footprinting B. openAuthoriztion C. cognitive biometrics D. Internet throttling
A. computer footprinting