1600 Flashcards
Which of the following attacks on passwords requires the attacker to have physical access to the computer to insert a USB flash drive? A. resetting B. capturing C. social engineering D. online guessing
A. resetting
What is a hybrid attack? A. an attack that combines a dictionary attack with an online guessing attack B. a brute force attack that uses special tables C. an attack that slightly alters dictionary words D. an attack that uses both automated and user input
C. an attack that slightly alters dictionary words
Each of the following is a step in creating a strong password except __________. A. use a short password so the computer can process it more quickly B. avoid using phonetic words C. do not use sequences D. do not use personal information
A. use a short password so the computer can process it more quickly
A token code is valid ___________. A. for as long as it appears on the device B. for up to one hour C. only for the user who possesses the device D. if it is longer than eight characters
A. for as long as it appears on the device
A token system that requires the user to enter the code along with a PIN is called a __________. A. single-factor authentication system B. dual-prong verification system C. multifactor authentication system D. token-passing authentication system
C. multifactor authentication system
A __________ is a U.S. Department of Defense (DoD) smart card that is used for identification for active-duty and reserve military personnel. A. Personal Identity Verification (PIV) card B. Government Smart Card (GSC) C. Secure ID Card (SIDC) D. Common Access Card (CAC)
D. Common Access Card (CAC)
Keystroke dynamics is an example of ___________ biometrics. A. resource B. cognitive C. adaptive D. behavioral
D. behavioral
Creating a pattern of when and from where a user accesses a remote Web account is an example of ___________. A. Time-Location Resource Monitoring (TLRM) B. keystroke dynamics C. cognitive biometrics D. computer footprinting
D. computer footprinting
___________ is a decentralized open source FIM that does not require specific software to be installed on the desktop. A. SSO Login Resource (SSO-LR) B. Windows CardSpace C. OpenID D. Windows Live ID
C. OpenID
Which of the following human characteristics cannot be used for biometric identification? A. face B. weight C. fingerprint D. retina
B. weight
__________ biometrics is related to the perception - thought processes - and understanding of the user. A. Standard B. Intelligent C. Behavioral D. Cognitive
D. cognitive
Using one authentication credential to access multiple accounts or application is __________. A. credentialization B. identification authentication C. single sign-on D. federal login
C. single sign-on
A disadvantage of biometric readers is __________. A. speed B. size C. cost D. standards
C. cost
Which single sign-on (SSO) technology depends on tokens? A. OAuth B. CardSpace C. OpenID D. All SSO technologies use tokens
A. OAuth
Why should the account lockout threshold not be set too low? A. it could decrease calls to the help desk B. because the network administrator would then have to manually reset the account C. so the user would not have to wait too long to have their password reset. D. it could result in denial of service (DoS) attacks
D. it could result in denial of service (DoS) attacks