Ch.12 Flashcards

1
Q

A secret combination of letters, numbers, and/or characters that only the user should have knowledge of, is known as a:

Question 1 options:

token

password

biometric detail

challenge

A

password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the center of the weakness of passwords?

Question 2 options:

human memory

encryption technology

handshake technology

human reliability

A

human memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Passwords that are transmitted can be captured by what type of software?

Question 3 options:

application analyzer

system analyzer

function analyzer

protocol analyzer

A

protocol analyzer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What type of attack involves an attacker stealing a file containing password digests and comparing the digests with digests created by the attacker?

Question 4 options:

offline cracking

online cracking

hash replay

token replay

A

offline cracking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What type of attack involves using every possible combination of letters, numbers, and characters to create candidate digests that are then matched against those in a stolen digest file?

Question 5 options:

Space division

Brute force

Known ciphertext

Known plaintext

A

Brute force

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What variation of a dictionary attack involves a dictionary attack combined with a brute force attack, and will slightly alter dictionary words by adding numbers to the end of the password, spelling words backward, slightly misspelling words, or including special characters?

Question 6 options:

brute force

hash replay

network replay

hybrid

A

hybrid

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The use of what item below involves the creation of a large pregenerated data set of candidate digests?

Question 7 options:

Rainbow tables

Randomized character list

Word list

Cascade tables

A

Rainbow tables

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What kind of biometrics utilizes a person’s unique physical characteristics for authentication, such as fingerprints or unique characteristics of a person’s face?

Question 8 options:

Cognitive biometrics

Reactive biometrics

Standard biometrics

Affective biometrics

A

Standard biometrics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which term below describes the time it takes for a key to be pressed and then released?

Question 9 options:

Dwell time

Lead time

Sync time

Show time

A

Dwell time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which type of biometrics is based on the perception, thought process, and understanding of the user?

Question 10 options:

Standard biometrics

Reactive biometrics

Cognitive biometrics

Affective biometrics

A

Cognitive biometrics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The use of a single authentication credential that is shared across multiple networks is called:

Question 11 options:

Access management

Authorization management

Identity management

Risk management

A

Identity management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The use of one authentication credential to access multiple accounts or applications is referred to as?

Question 12 options:

Individual Sign On

Single Sign On

Unilateral Sign On

Federated Sign On

A

Single Sign On

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What technology allows users to share resources stored on one site with a second site without forwarding their authentication credentials to the other site?

Question 13 options:

OpenAuth

OAuth

SAML

Kerberos

A

OAuth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Select below the decentralized open-source FIM that does not require specific software to be installed on the desktop:

Question 14 options:

​OAuth

​OpenID

​Windows Live ID

​OpenPass

A

​OpenID

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What federated identity management (FIM) relies on token credentials?

Question 15 options:

​OAuth

​OpenID

​Windows Live

​OpenPass

A

​OAuth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A U.S. Department of Defense (DoD) smart card that is used for identification of active-duty and reserve military personnel along with civilian employees and special contractors is called:

Question 16 options:

​Common Access Card (CAC)

​Identity Validation Card (IVC)

​Credential Validation Card (CVC)

​Personal Credential Card (PCC)

A

Common Access Card (CAC)

17
Q

What can be used to increase the strength of hashed passwords?​

Question 17 options:

​Salt

​Key stretching

​Double hashing

Crypting

A

​Salt

18
Q

A list of the available nonkeyboard characters can be seen in Windows by opening what utility?

Question 18 options:

​charmap.exe

​charlist.exe

​chardump.exe

​listchar.exe

A

​charmap.exe

19
Q

Which hashing algorithm below is used with NTLMv2’s Hashed Message Authentication Code?

Question 19 options:

​SHA-1

​SHA-256

​MD4

​MD5

A

​MD5

20
Q

What type of one-time password (OTP) changes after a set time period?

Question 20 options:

HMAC-Based one-time password (HOTP)

Period-based one-time password (POTP)

Time-based one-time password (TOTP)

Interval-based one-time password (IOTP)

A

Time-based one-time password (TOTP)