Module 12 Flashcards
lya has been asked to recommend a federation system technology that is an open source federation framework that can support the development of authorization protocols. Which of these technologies would he recommend?
- Shibboleth
- NTLM
- Open ID
- OAuth
Correct. OAuth is a federation system technology that is an open source federation framework that can support the development of authorization protocols.
Timur was making a presentation regarding how attackers break passwords. His presentation demonstrated the attack technique that is the slowest yet most thorough attack that is used against passwords. Which of these password attacks did he demonstrate?
- Custom attack
- Hybrid attack
- Brute force attack
- Dictionary attack
Correct. A brute force attack is the slowest yet most thorough type.
Which human characteristic is NOT used for biometric identification?
- Height
- Iris
- Retina
- Fingerprint
Correct. Height cannot be used for biometric identification because many people share the same height.
Which of these creates a format of the candidate password to significantly reduce the time needed to crack a password?
- Rainbow
- Pass the hash
- Overlay
- Mask
Mask
Which of the following is NOT an MFA using a smartphone?
- Automated phone call
- SMS text message
- Biometric gait analysis
- Authentication app
Correct. Gait analysis requires more technology than a smartphone to measure.
Which of the following is an authentication system that uses UDP over TCP?
- TACACS+
- Shibboleth
- OAuth
- RADIUS
Correct. RADIUS uses UDP as the transport protocol.
While analyzing a security breach, you found the attacker followed these attack patterns:
The attacker initially tried the commonly used password “passw0rd” on all enterprise user accounts and then started trying various intelligible words like “passive,” “partner,” etc.
Which of the following attacks was performed by the attacker?
- Initially, a dictionary attack and then a rule attack.
- Initially, a brute force attack and then a dictionary attack.
- Initially, a password spraying attack and then a brute force attack.
- Initially, a brute force attack and then a password spraying attack.
Correct. Initially, the attacker performed a password spraying attack by trying the same password on different accounts. Then, they tried a dictionary attack by trying different intelligible words to crack the password.
The following statements regarding centralized administration concepts are presented to you in an interview in which only one of them is correct. Which of these is correct?
- Extensible authentication protocol is a framework to transport authentication protocols.
- Directory service is an XML standard that allows secure web domains to exchange user authentication and authorization data.
- A RADIUS client can be defined as a desktop or a wireless laptop requesting authentication.
- The transport protocol used by RADIUS is TCP.
Correct. The extensible authentication protocol (EAP) is a framework that is used to transport authentication protocols.
Which of the following human characteristic is used for authentication?
- Height
- Breathing pattern
- Facial expression
- Veins
Correct. Vein images in a user’s palm or finger can be used for authentication and are identified through a vein-scanning tablet.
You are asked to choose a secure authentication method other than a username and password for the employees to access your enterprise’s database. Which of the following should you choose?
- Security key authentication
- Smart card authentication
- Gait recognition
- Facial recognition
Correct. Security keys can authenticate a user with one tap and provide suitable security.
An attacker collected many usernames from a website and tried to login into the accounts using the password “passw0rd”. What type of attack was this?
- Password spraying
- Pass the hash attack
- Brute force attack
- Password phishing
Correct. Password spraying attacks try commonly used passwords on different user accounts.
In an interview, you were asked to crack a password and told that the password is a commonly used word. Which of the following methods should you apply?
- You should perform a rule attack.
- You should perform a dictionary attack.
- You should perform skimming.
- You should perform a brute force attack.
You should perform a dictionary attack.
Which of the following is an authentication system that issues a ticket after verifying the credentials by which you can authenticate other services?
- RADIUS
- SAML
- Kerberos
- TACACS+
Correct. After successful authentication, Kerberos issues a ticket that allows other services to be accessed.
In a multifactor authentication-enabled facility, you are asked the following question: “What type of food was served on your child’s first birthday?” Which of the following is the authentication method used here?
- Behavioral biometrics
- Security key authentication
- Cognitive biometrics
- Physiological biometrics
Correct. Cognitive biometrics is related to the perception, thought process, and understanding of the user.
In an interview, you were asked to choose the least vulnerable password from the following list. Which of the following should you choose?
- n2(f!%^*%:(r)!#$
- # International$
- earthwaterforesttreemanworldkid
- honesty
Correct. This is less complex, but it is the lengthiest password, making it less vulnerable than the others.
Which attack uses one or a small number of commonly used passwords to attempt to log in to several different user accounts?
- Online brute force attack
- Role attack
- Offline brute force attack
- Password spraying attack
Correct. A password spraying attack uses one or a small number of commonly used passwords (Password1 or 123456) and then uses this same password when trying to log in to several different user accounts. Because this targeted guess is spread across many different accounts instead of attempting multiple password variations on a single account, it is much less likely to raise any alarms or lock out the user account from too many failed password attempts.
Which of the following is an authentication credential used to access multiple accounts or applications?
- Federal login
- Identification authentication
- Credentialization
- Single sign-on
Correct. One application of federation is single sign-on (SSO) or using one authentication credential to access multiple accounts or applications. SSO holds the promise of reducing the number of usernames and passwords that users must memorize.