Lecture 2 Flashcards

1
Q

What are the two steps of authentication?

A

Identification and authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the four means of authenticating user identity based on?

A
  • Something the individual knows
  • Something the individual possesses
  • Something the individual is
  • Something the individual does
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the role of the username/login ID?

A

Determines that the user is authorized to access the system.
Determines the user’s privileges.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the role of the password?

A

Confirms that the user is really who they claim they are.
Establishes trust and allows access to the resource.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does an exhaustive search (brute force) password attack do?

A

It tries all possible combinations of valid symbols, up to a certain length.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does an intelligent search password attack do?

A

It searches through a restricted name space, e.g., try passwords that are somehow associated with a user such as name, names of friends or relatives, car brand, phone numbers, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

True or false. Is a dictionary attack an example of an intelligent search?

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Name at least 3 password attack methods

A

Dictionary attack
Brute force attack
Password spoofing attack
Sniffing and key loggers attack
Shoulder surfing attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly