Chapter 3 Flashcards

1
Q

what is the basic usecase for authentication

A

to prove you are who you say you are

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what is the basis for access control and user accountability

A

authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the 4 means of authenticating user identity

A

something the user knows

something they possess

something they are

something they do

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

examples of something the user knows

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

examples of something the user posseses

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

examples of something the user is

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

examples of something the user does

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what is assurance level

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a dictionary attack

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

what is a rainbow table attack

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what is john the ripper

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

2 ways of proactive password checking

A

list of passwords not allowed

make sure a passwords meets certain rules which are set

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

what is the diff between memory cards and smart tokens

A

smark tokens have computation capability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

3 diff types of authentication protocols for smart tokens

A

static

dynamic password generator

challenge response

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

smart card vs smart token

A

no diff, except has appearance of credit card

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

main goal of biometric authentication

A

attempt to authenticate an individual based on unique physical characterisitcs

17
Q

do you always get perfect matches for biometric authentication

A

no, never get identical templates

18
Q

what are aditional challeneges with authentication over the network

A
19
Q

what is a “handshake” when doing remote user authentication an example of

A

challenge response

20
Q

what is a nonce

A

a one time random number

21
Q
A