Chapter 11 Flashcards

1
Q

Discuss the types of shortcuts that users take to help them recall their passwords.

A

two types:

1) create weak passwords
2) reusing the same passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A retina scanner has become the most common type of standard biometrics.

(T/F)

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following account lockout policy settings determines the number of failed login attempts before a lockout occurs?

a) administrator lockout threshold
b) system lockout threshold
c) account lockout threshold
d) user lockout threshold

A

c) account lockout threshold

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following options prevents a logon after a set number of failed logon attempts within a specificed period and can also specify the length of time that the lockout is in force?

a) password lockout
b) logon lock
c) password lock
d) logon lockout

A

a) password lockout

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following accounts is a user account that is created explicitly to provide a security context for services running on a server?

a) priviliged account
b) shared account
c) service account
d) system account

A

c) service account

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Describe how rainbow table works.

A

Rainbow tables are designed to make password attacks easier. They do this by creating a large pregenerated data set of candidate digests.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Name the advantages to using rainbow tables.

A

1) can be used repeatedly
2) are must fastert than dictionary attacks
3) amount of memory needed on the attacking machine is greatly reduced

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Brute force attacks can be very slow because every character combination must be generated.

(T/F)

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A US Dept. of Defense smart card that is used for identification of active-duty and reserve military personnel along with civilian employees and special contractors is called:

a) Creditential Validation Card (CVC)
b) Common Access Card (CAC)
c) Identify Validation Card (IVC)
d) Personal Credential Card (PCC)

A

b) Common Access Card (CAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Passwords provide strong protection.

(T/F)

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A hardware security token is typically a small device with a window display.

(T/F)

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which authentication factor is based on a unique talent that a user possesses?

a. What you have
b. What you are
c. What you do
d. What you know

A

c. What you do

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of these is NOT a characteristic of a weak password?

a. A common dictionary word
b. A long password
c. Using personal information
d. Using a predictable sequence of characters

A

b. A long password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Each of the following accounts should be prohibited EXCEPT:

a. Shared accounts
b. Generic accounts
c. Privileged accounts
d. Guest accounts

A

c. Privileged accounts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Ilya has been asked to recommend a federation system technology that is an open source federation framework that can support the development of authorization protocols. Which of these technologies would he recommend?

a. OAuth
b. Open ID Connect
c. Shibboleth
d. NTLM

A

a. OAuth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How is key stretching effective in resisting password attacks?

a. It takes more time to generate candidate password digests.
b. It requires the use of GPUs.
c. It does not require the use of salts.
d. The license fees are very expensive to purchase and use it.

A

a. It takes more time to generate candidate password digests.

17
Q

Which of these is NOT a reason why users create weak passwords?

a. A lengthy and complex password can be difficult to memorize.
b. A security policy requires a password to be changed regularly.
c. Having multiple passwords makes it hard to remember all of them.
d. Most sites force users to create weak passwords even though they do not want to.

A

d. Most sites force users to create weak passwords even though they do not want to.

18
Q

What is a hybrid attack?

a. An attack that uses both automated and user input
b. An attack that combines a dictionary attack with a mask attack
c. A brute force attack that uses special tables
d. An attack that slightly alters dictionary words

A

b. An attack that combines a dictionary attack with a mask attack

19
Q

A TOTP token code is generally valid for what period of time?

a. Only while the user presses SEND
b. For as long as it appears on the device
c. For up to 24 hours
d. Until an event occurs

A

b. For as long as it appears on the device

20
Q

What is a token system that requires the user to enter the code along with a PIN called?

a. Single-factor authentication system
b. Token-passing authentication system
c. Dual-prong verification system
d. Multifactor authentication system

A

d. Multifactor authentication system

21
Q

Which of these is a U.S. Department of Defense (DoD) smart card that is used for identification of active-duty and reserve military personnel?

a. Personal Identity Verification (PIV) card
b. Secure ID Card (SIDC)
c. Common Access Card (CAC)
d. Government Smart Card (GSC)

A

c. Common Access Card (CAC)

22
Q

Which of the following should NOT be stored in a secure password database?

a. Iterations
b. Password digest
c. Salt
d. Plaintext password

A

d. Plaintext password

23
Q

Creating a pattern of where a user accesses a remote web account is an example of which of the following?

a. Keystroke dynamics
b. Geolocation
c. Time-Location Resource Monitoring (TLRM)
d. Cognitive biometrics

A

b. Geolocation

24
Q

Timur was making a presentation regarding how attackers break passwords. His presentation demonstrated the attack technique that is the slowest yet most thorough attack that is used against passwords. Which of these password attacks did he demonstrate?

a. Dictionary attack
b. Hybrid attack
c. Custom attack
d. Brute force attack

A

d. Brute force attack

25
Q

Which human characteristic is NOT used for biometric identification?

a. Retina
b. Iris
c. Height
d. Fingerprint

A

c. Height

26
Q

_____ biometrics is related to the perception, thought processes, and understanding of the user.

a. Cognitive
b. Standard
c. Intelligent
d. Behavioral

A

a. Cognitive

27
Q

Using one authentication credential to access multiple accounts or applications is known as _____.

a. single sign-on
b. credentialization
c. identification authentication
d. federal login

A

a. single sign-on

28
Q

What is a disadvantage of biometric readers?

a. Speed
b. Cost
c. Weight
d. Standards

A

b. Cost

29
Q

Which type of password attack is a more targeted brute force attack that uses placeholders for characters in certain positions of the password?

a. Rainbow attack
b. Mask attack
c. Rule attack
d. Pass the hash attack

A

b. Mask attack

30
Q

Why should the account lockout threshold not be set too low?

a. It could decrease calls to the help desk.
b. The network administrator would have to reset the account manually.
c. The user would not have to wait too long to have her password reset.
d. It could result in denial of service (DoS) attacks.

A

d. It could result in denial of service (DoS) attacks.

31
Q

Which one-time password is event-driven?

a. HOTP
b. TOTP
c. ROTP
d. POTP

A

a. HOTP