ch 11 Flashcards

1
Q

what are the type of authenticating credentials

A
Where you are 
What you have 
What you are  
What you know
What you do
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what is the biggest weakness to passwords

A

human memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Attacks that can be used to discover passwords:

A

• Attacks on Passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Phishing, shoulder surfing, dumpster diving

A

-Social engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Keylogger, protocol analyzer

Man-in-the-middle and replay attacks

A

Capturing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Attacker gains physical access to computer and resets password

A

-Resetting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Method used by most password attacks today
Attackers steal file of password digests
Compare with their own digests they have created

A

-Offline attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Every possible combination of letters, numbers, and characters used to create encrypted passwords and matched against stolen file
Slowest, most thorough method

A

Brute force

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

(N T L M)

A

New Technology LAN Manager

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

what kind of attack is when An attacker who can steal the digest of an N T L M password would not need to try to break it
He would simply pretend to be the user and send that hash to the remote system to then be authenticated

A

Known as a pass the hash attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A more targeted brute force attack that uses placeholders for characters in certain positions of the password

A

Mask Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Conducts a statistical analysis on the stolen passwords that is used to create a mask to break the largest number of passwords

A

Rule Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Attacker creates digests of common dictionary words

Compares against stolen digest file

A

Dictionary Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Two key stretching algorithms

A

bcrypt and P B K D F 2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

When a user is using more than one type of authentication credential

A

Multifactor authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Using just oneMost common items used for authentication

A

Single-factor authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

(O T P)

A

Used to create a one-time password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Authentication code that can be used only once or for a limited period of time

A

one-time password (O T P)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

where is the hardware token generally

A

Typically a small device with a window display

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

where is the software token generally stored

A

Stored on a general-purpose device like a laptop computer or smartphone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

(T O T P)

A

Time-based one-time password

22
Q

(H O T P)

A

HMAC-based one-time password

23
Q

Two types of O T P s

A

Time-based one-time password (T O T P)

HMAC-based one-time password (H O T P)

24
Q

(P I V)

A

Personal Identity Verification

25
Q

The smart card standard covering all U.S. government employees

A

Personal Identity Verification (P I V)

26
Q

what is a Contact card

A
a “pad” that allows electronic access to chip contents
Contactless cards (proximity cards)
27
Q

Uses a person’s unique physical characteristics for authentication
Face, hand, or eye characteristics are used to authenticate

A

Standard biometrics

28
Q

Retinal scanner uses the human retina as a biometric identifier
Maps the unique patterns of a retina by directing a beam of low-energy infrared light (I R) into a person’s eye

A

Specialized Biometric Scanners

29
Q

what fingerprint scanner takes a picture and compares with image on file

A

Static fingerprint scanner

30
Q

what fingerprint scanner uses a small slit or opening

A

Dynamic fingerprint scanner

31
Q

Voice recognition uses a standard computer microphone to identify users based on the unique characteristics of a person’s voice

A

Standard Input Devices

32
Q

Biometric Disadvantages

A
Cost of hardware scanning devices
Readers have some amount of error
Reject authorized users
Accept unauthorized users
Biometric systems can be “tricked
33
Q

(FAR)

A

False acceptance rate

34
Q

(FRR)

A

False rejection Rate

35
Q
  • what is it called when someone else can log into your device
A

(FAR) False acceptance rate

36
Q

what is it called when a user cannot log into their own device

A

(FRR) False rejection Rate

37
Q

(CER)

A

crossover error rate

38
Q

what is it called when nhow often FAR and FRR happen

A

(CER) crossover error rate

39
Q

Relates to perception, thought process, and understanding of the user
Easier for user to remember because it is based on user’s life experiences
Difficult for an attacker to imitate

A

Cognitive biometrics

40
Q

(PGA)

A

Picture password/Picture Gesture Authentication

41
Q

Users select a picture to use for which there should be at least 10 “points of interest” that could serve as “landmarks” or places to touch

A

(PGA) Picture password/Picture Gesture Authentication

42
Q

Authenticates by normal actions the user performs
Keystroke dynamics
Attempts to recognize user’s typing rhythm

A

Behavioral biometrics

43
Q

time it takes to press and release a key

A

Dwell time

44
Q

time between keystrokes

A

Flight time

45
Q

The identification of the location of a person or object using technology

A

• Geolocation

46
Q

(FIM)

A

federated identity management

47
Q

Using a single authentication credential shared across multiple networks

A

federated identity management (FIM)

48
Q

(S S O)

A

Single sign-on (S S O)

49
Q

Examples of popular S S O s:

A

OAuth (used the most), Open ID Connect, and Shibboleth

50
Q

Microsoft Windows group password settings
Password Policy Settings
Account Lockout Policy
is managed by what?

A

assign privileges by group (group policy)

51
Q

A two-way relationship that is automatically created between parent and child domains in a Microsoft Active Directory Forest

A

• Transitive trust