Chapter 3 Flashcards

1
Q

the Process of verifying an identity claimed by or for a system entity. An authentication process consists of two steps. What are these steps?

A

1) Identification Step 2) Verification Step

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the four general means of authenticating a user’s identity, which can be used alone or in combination? All of these methods, properly implemented and used, can provide secure user authentication.

A

1) Something the individual knows 2) Something the individual possesses 3) Something the individual is (static biometrics) 4) Something the individual does (dynamic biometrics)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The process of verifying an identity claimed by or for a system entity is defined as______.

A

User Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Typically, strong access controls are used to protect the system’s password file. However, experience shows that determined hackers can frequently bypass such controls and gain access to the file. The attacker obtains the system password file and compares the password hashes against hashes of commonly used passwords. If a match is found, the attacker can gain access by that ID/password combination. a. Popular Password Attack b. Workstation Hijacking c. Specific Account Attack d. Offline Dictionary Attack

A

d. Offline Dictionary Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The attacker targets a specific account and submits password guesses until the correct password is discovered. a. Exploiting Multiple Password Use b. Specific Account Attack c. Offline Dictionary Attack d. Workstation Hijacking

A

b. Specific Account Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A variation of the preceding attack is to use a popular password and try it against a wide range of user IDs. A user’s tendency it to choose a password that is easily remembered; this unfortunately makes the password easy to guess. a. Offline Dictionary Attack b. Exploiting User Mistakes c. Electronic Monitoring d. Popular Password Attack

A

d. Popular Password Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The attacker attempts to gain knowledge about the account holder and system password policies and uses that knowledge to guess the password. a. Password guessing against single user b. Popular password attack c. Electronic monitoring d. Specific account attack

A

a. Password guessing against single user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The attacker waits until a logged-in workstation is unattended a. Exploiting user mistakes b. Workstation hijacking c. Offline dictionary attack d. password guessing against single user.

A

b. Workstation hijacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

If the system assigns a password, then the user is more likely to write it down because it is difficult to remember. This situation creates the potential for an adversary to read the written password. A user may intentionally share a password, to enable a colleague to share files, for example. Also, attackers are frequently successful in obtaining passwords by using social engineering tactics that trick the user or an account manager into revealing a password. Many computer systems are shipped with preconfigured passwords for system administrators. Unless these preconfigured passwords are changed, they are easily guessed. a. Specific Account Attack b. Exploiting User Mistakes c. Offline Dictionary Attack d. Popular Password Attack

A

b. Exploiting User Mistakes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Attacks can also become much more effective or damaging if different network devices share the same or a similar password for a given user. a. Exploiting Multiple Password Use b, Exploiting User Mistakes c. Specific Account Attack d. Popular Password Attack

A

a. Exploiting Multiple Password Use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

If a password is communicated across a network to log on to a remote system, it is vulnerable to eavesdropping. Simple encryption will not fix this problem, because the encrypted password is, in effect, the password and can be observed and reused by an adversary a. Specific Account Attack b. Exploiting User Mistakes c. Electronic Monitoring d. Password Guessing Against Single User

A

c. Electronic Monitoring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are some countermeasures to an offline dictionary attack?

A
  • controls to prevent unauthorized access to the password file
  • ntrusion detection measures to identify a compromise
  • rapid reissuance of passwords.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Countermeasures for Specific Account Attack

A

An account lockout mechanism, this locks out access to the account after a number of failed login attampts. Typical practice is no more than fice access attempts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Popular Password Attack Countermeasures.

A
  • Policies to inhibit the selection by users of common passwords
  • Scanning the IP Addresses of authentication requests and client cookies for submission patterns.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Password Guessing Against Single User countermeasures.

A
  • Training in and enforcement of password policies that make passwords difficult to guess.

Such policies address the secrecy, minimum length of the password, character set ,prohibition against using well-known user identifiers, and length of time before the password must be changed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Workstation Hijacking countermeasures

A

Automatically logging the workstation out after a period of inactivity. Intrusion detection schemes can be used to detect changes in behavior.

17
Q

Exploiting User Mistakes Countermeasures

A
  • User Training
  • Intrusion Detection
  • Simpler passwords combined with another authentication mechanism
18
Q

Exploiting Multiple Password Use Countermeasures

A

Include a policy that forbids the same or similar pasword on particular network devices

19
Q

Electronic Monitoring Countermeasures

A

If a password is communicated across a network to log on to a remote system, it is vulnerable to eavedropping. Simple encryption will not fix this problem, because the encrypted password is, in effect, the password and can be observed and reused by an adversary

20
Q

To load a new password into the system, the user selects or is assigned a password. This password is combined with a fixed-length _____ value. In older implementations, this value is related to the time at which the password is assigned to the user.

a. Token
b. Verification
c. Salt
d. Smart Card

A

c. Salt

21
Q
A