Lecture 2 Flashcards

1
Q

What are the two steps of authentication?

A

Identification (announcing who you are) and authentication (proving who you are).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is multifactor authentication (MFA)?

A

Using two or more authentication factors (e.g., password + token).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the role of a username/login ID?

A

It determines user authorization and privileges.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How do passwords help with authentication?

A

They confirm that the user is who they claim to be.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a brute-force attack?

A

Trying all possible password combinations until the correct one is found.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How does a dictionary attack work?

A

It tries common words and phrases to guess passwords.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a rainbow table attack?

A

Using a precomputed table of hash values to crack passwords quickly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How does salting improve password security?

A

It adds random data to passwords before hashing, preventing identical hashes for identical passwords.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are common password vulnerabilities?

A

Weak passwords, reuse, phishing, and keyloggers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the role of password aging?

A

It forces users to change passwords regularly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How does a trusted path help against spoofing attacks?

A

It ensures users communicate with the actual system, not a fake login page.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is token authentication?

A

A method where users provide a physical token (e.g., smart card) for authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is biometric authentication?

A

Identifying a user based on unique physical characteristics.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Give three examples of biometric authentication methods.

A

Fingerprints, iris scanning, voice recognition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are false match rate (FMR) and false non-match rate (FNMR)?

A

FMR: Rate of incorrectly accepting an unauthorized user; FNMR: Rate of incorrectly rejecting an authorized user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is remote user authentication?

A

Authenticating users over a network (e.g., logging in via the Internet).

17
Q

Name one security threat to remote authentication.

A

Replay attacks (reusing captured login credentials).