Authentication Flashcards
Which of the following are biometric devices? (Select two)
– Retina scanner
– Smartcard reader
– Digitizer
– Face scanner
– Retina scanner
– Face scanner
You are configuring the local security policy of a Windows system. You want to require users to create passwords that are at least 10 characters long. You also want to prevent login after three unsuccessful marketing tips. Which policy should you configure?
– Account lockout duration – Account lockout threshold – Minimum password length – Maximum password age – Enforced password history – Password complexity
– Account lockout threshold
– Minimum password length
Which of the following is not a form of biometrics
– Token device
– Fingerprint
– Face recognition
– Retina scan
Token device
Well trying to logon, a user accidentally typed the wrong password three times, and all the system tells him that he can’t logon because of too many incorrect passwords. He still remembers his password, but just typed it in wrong. He needs access as quickly as possible. What should you do?
Unlock the account
Which of the following is a hardware device that contains identification information in which can be used to control building access or computer logon?
– Biometric – Security policy – WAP – SS ID – Smartcard
Smartcard
Following Windows installation, you enable the building administrator account. You remove the password for this account. You enable Remote Desktop on your computer using the default settings. From home, you’re trying to access your computer using Remote Desktop using the administrator account, but you were unable to log on. What should you do?
– Make the administrator account in member of the remote desktop user group
– Unlock the administrator account
– Enable fast user switching on the computer
– Configure password for the administrator account
Configure password for the administrator account
Which of the following is an example of a strong password?
- desktop#7
- Robert694
- at9iov45a
- a8bT11$yi
a8bT11$yi
Which of the following security measures is a form of bio metrics?
–Chassis intrusion detection
–Bios password
–TPM
–Fingerprint scanner
–Fingerprint scanner
You manage to computers with the following user account:
- Wrk1 Has user account Mary and Admin. The new account does not have a password set; the admin account does.
- Wrk2 has user accounts Mary and Julia. The Mary account has a password set; the Julia account does not.
You’re working from Wrk2 and would like to access a shared folder on Wrk1. What credentials should you used to access the shared folder?
– Type Julia from the username and leave the password blank
– Type Mary for the username and leave the password blank
– Type Mary for the username and specify the password
– Type admin for the username and specify the password
Type admin for the username and specify the password
Which type of biometric authentication use the ridges of your skin?
Fingerprint
A user is trying to long into her notebook computer. She enters the correct password for her user account, but the system won’t let her authenticate, claiming the wrong password has been entered. What’s causing the problem?
– She has entered the wrong password too many times, causing intruder detection and windows to lock the system
– The Scroll lock key has pressed, blocking all input from the keyboard
– She has turned Num lock on causing numbers to be sent from the keyboard instead of letters
– The keyboard must be replaced
– The CPU is in Powersave mode causing all on incomes to be denied
She has turned Num lock on causing numbers to be sent from the keyboard instead of letters
You are configuring the local security policy of a window system. You want to prevent users from using all passwords. You also want to force them to use new password for at least five days before changing it again. Which policy should you configure? (Select two) – Maximum password age – minimum password age – Password complexity – Enforced password history
minimum password age
Enforced password history
Which of the following is the most common form of authentication?
– Fingerprint
– Digital certificate on smartcard
– Photo ID
– Username and password
Username and password
What do biometrics use to perform authentication of identity?
– The ability to perform tasks
– Possession of the device
– Knowledge of passwords
– Human characteristics
Human characteristics