Ch.12 Flashcards
A secret combination of letters, numbers, and/or characters that only the user should have knowledge of, is known as a:
Question 1 options:
token
password
biometric detail
challenge
password
What is the center of the weakness of passwords?
Question 2 options:
human memory
encryption technology
handshake technology
human reliability
human memory
Passwords that are transmitted can be captured by what type of software?
Question 3 options:
application analyzer
system analyzer
function analyzer
protocol analyzer
protocol analyzer
What type of attack involves an attacker stealing a file containing password digests and comparing the digests with digests created by the attacker?
Question 4 options:
offline cracking
online cracking
hash replay
token replay
offline cracking
What type of attack involves using every possible combination of letters, numbers, and characters to create candidate digests that are then matched against those in a stolen digest file?
Question 5 options:
Space division
Brute force
Known ciphertext
Known plaintext
Brute force
What variation of a dictionary attack involves a dictionary attack combined with a brute force attack, and will slightly alter dictionary words by adding numbers to the end of the password, spelling words backward, slightly misspelling words, or including special characters?
Question 6 options:
brute force
hash replay
network replay
hybrid
hybrid
The use of what item below involves the creation of a large pregenerated data set of candidate digests?
Question 7 options:
Rainbow tables
Randomized character list
Word list
Cascade tables
Rainbow tables
What kind of biometrics utilizes a person’s unique physical characteristics for authentication, such as fingerprints or unique characteristics of a person’s face?
Question 8 options:
Cognitive biometrics
Reactive biometrics
Standard biometrics
Affective biometrics
Standard biometrics
Which term below describes the time it takes for a key to be pressed and then released?
Question 9 options:
Dwell time
Lead time
Sync time
Show time
Dwell time
Which type of biometrics is based on the perception, thought process, and understanding of the user?
Question 10 options:
Standard biometrics
Reactive biometrics
Cognitive biometrics
Affective biometrics
Cognitive biometrics
The use of a single authentication credential that is shared across multiple networks is called:
Question 11 options:
Access management
Authorization management
Identity management
Risk management
Identity management
The use of one authentication credential to access multiple accounts or applications is referred to as?
Question 12 options:
Individual Sign On
Single Sign On
Unilateral Sign On
Federated Sign On
Single Sign On
What technology allows users to share resources stored on one site with a second site without forwarding their authentication credentials to the other site?
Question 13 options:
OpenAuth
OAuth
SAML
Kerberos
OAuth
Select below the decentralized open-source FIM that does not require specific software to be installed on the desktop:
Question 14 options:
OAuth
OpenID
Windows Live ID
OpenPass
OpenID
What federated identity management (FIM) relies on token credentials?
Question 15 options:
OAuth
OpenID
Windows Live
OpenPass
OAuth