Chapter 11 Flashcards
Discuss the types of shortcuts that users take to help them recall their passwords.
two types:
1) create weak passwords
2) reusing the same passwords
A retina scanner has become the most common type of standard biometrics.
(T/F)
False
Which of the following account lockout policy settings determines the number of failed login attempts before a lockout occurs?
a) administrator lockout threshold
b) system lockout threshold
c) account lockout threshold
d) user lockout threshold
c) account lockout threshold
Which of the following options prevents a logon after a set number of failed logon attempts within a specificed period and can also specify the length of time that the lockout is in force?
a) password lockout
b) logon lock
c) password lock
d) logon lockout
a) password lockout
Which of the following accounts is a user account that is created explicitly to provide a security context for services running on a server?
a) priviliged account
b) shared account
c) service account
d) system account
c) service account
Describe how rainbow table works.
Rainbow tables are designed to make password attacks easier. They do this by creating a large pregenerated data set of candidate digests.
Name the advantages to using rainbow tables.
1) can be used repeatedly
2) are must fastert than dictionary attacks
3) amount of memory needed on the attacking machine is greatly reduced
Brute force attacks can be very slow because every character combination must be generated.
(T/F)
True
A US Dept. of Defense smart card that is used for identification of active-duty and reserve military personnel along with civilian employees and special contractors is called:
a) Creditential Validation Card (CVC)
b) Common Access Card (CAC)
c) Identify Validation Card (IVC)
d) Personal Credential Card (PCC)
b) Common Access Card (CAC)
Passwords provide strong protection.
(T/F)
False
A hardware security token is typically a small device with a window display.
(T/F)
True
Which authentication factor is based on a unique talent that a user possesses?
a. What you have
b. What you are
c. What you do
d. What you know
c. What you do
Which of these is NOT a characteristic of a weak password?
a. A common dictionary word
b. A long password
c. Using personal information
d. Using a predictable sequence of characters
b. A long password
Each of the following accounts should be prohibited EXCEPT:
a. Shared accounts
b. Generic accounts
c. Privileged accounts
d. Guest accounts
c. Privileged accounts
Ilya has been asked to recommend a federation system technology that is an open source federation framework that can support the development of authorization protocols. Which of these technologies would he recommend?
a. OAuth
b. Open ID Connect
c. Shibboleth
d. NTLM
a. OAuth