Module 12 Flashcards
lya has been asked to recommend a federation system technology that is an open source federation framework that can support the development of authorization protocols. Which of these technologies would he recommend?
- Shibboleth
- NTLM
- Open ID
- OAuth
Correct. OAuth is a federation system technology that is an open source federation framework that can support the development of authorization protocols.
Timur was making a presentation regarding how attackers break passwords. His presentation demonstrated the attack technique that is the slowest yet most thorough attack that is used against passwords. Which of these password attacks did he demonstrate?
- Custom attack
- Hybrid attack
- Brute force attack
- Dictionary attack
Correct. A brute force attack is the slowest yet most thorough type.
Which human characteristic is NOT used for biometric identification?
- Height
- Iris
- Retina
- Fingerprint
Correct. Height cannot be used for biometric identification because many people share the same height.
Which of these creates a format of the candidate password to significantly reduce the time needed to crack a password?
- Rainbow
- Pass the hash
- Overlay
- Mask
Mask
Which of the following is NOT an MFA using a smartphone?
- Automated phone call
- SMS text message
- Biometric gait analysis
- Authentication app
Correct. Gait analysis requires more technology than a smartphone to measure.
Which of the following is an authentication system that uses UDP over TCP?
- TACACS+
- Shibboleth
- OAuth
- RADIUS
Correct. RADIUS uses UDP as the transport protocol.
While analyzing a security breach, you found the attacker followed these attack patterns:
The attacker initially tried the commonly used password “passw0rd” on all enterprise user accounts and then started trying various intelligible words like “passive,” “partner,” etc.
Which of the following attacks was performed by the attacker?
- Initially, a dictionary attack and then a rule attack.
- Initially, a brute force attack and then a dictionary attack.
- Initially, a password spraying attack and then a brute force attack.
- Initially, a brute force attack and then a password spraying attack.
Correct. Initially, the attacker performed a password spraying attack by trying the same password on different accounts. Then, they tried a dictionary attack by trying different intelligible words to crack the password.
The following statements regarding centralized administration concepts are presented to you in an interview in which only one of them is correct. Which of these is correct?
- Extensible authentication protocol is a framework to transport authentication protocols.
- Directory service is an XML standard that allows secure web domains to exchange user authentication and authorization data.
- A RADIUS client can be defined as a desktop or a wireless laptop requesting authentication.
- The transport protocol used by RADIUS is TCP.
Correct. The extensible authentication protocol (EAP) is a framework that is used to transport authentication protocols.
Which of the following human characteristic is used for authentication?
- Height
- Breathing pattern
- Facial expression
- Veins
Correct. Vein images in a user’s palm or finger can be used for authentication and are identified through a vein-scanning tablet.
You are asked to choose a secure authentication method other than a username and password for the employees to access your enterprise’s database. Which of the following should you choose?
- Security key authentication
- Smart card authentication
- Gait recognition
- Facial recognition
Correct. Security keys can authenticate a user with one tap and provide suitable security.
An attacker collected many usernames from a website and tried to login into the accounts using the password “passw0rd”. What type of attack was this?
- Password spraying
- Pass the hash attack
- Brute force attack
- Password phishing
Correct. Password spraying attacks try commonly used passwords on different user accounts.
In an interview, you were asked to crack a password and told that the password is a commonly used word. Which of the following methods should you apply?
- You should perform a rule attack.
- You should perform a dictionary attack.
- You should perform skimming.
- You should perform a brute force attack.
You should perform a dictionary attack.
Which of the following is an authentication system that issues a ticket after verifying the credentials by which you can authenticate other services?
- RADIUS
- SAML
- Kerberos
- TACACS+
Correct. After successful authentication, Kerberos issues a ticket that allows other services to be accessed.
In a multifactor authentication-enabled facility, you are asked the following question: “What type of food was served on your child’s first birthday?” Which of the following is the authentication method used here?
- Behavioral biometrics
- Security key authentication
- Cognitive biometrics
- Physiological biometrics
Correct. Cognitive biometrics is related to the perception, thought process, and understanding of the user.
In an interview, you were asked to choose the least vulnerable password from the following list. Which of the following should you choose?
- n2(f!%^*%:(r)!#$
- # International$
- earthwaterforesttreemanworldkid
- honesty
Correct. This is less complex, but it is the lengthiest password, making it less vulnerable than the others.
Which attack uses one or a small number of commonly used passwords to attempt to log in to several different user accounts?
- Online brute force attack
- Role attack
- Offline brute force attack
- Password spraying attack
Correct. A password spraying attack uses one or a small number of commonly used passwords (Password1 or 123456) and then uses this same password when trying to log in to several different user accounts. Because this targeted guess is spread across many different accounts instead of attempting multiple password variations on a single account, it is much less likely to raise any alarms or lock out the user account from too many failed password attempts.
Which of the following is an authentication credential used to access multiple accounts or applications?
- Federal login
- Identification authentication
- Credentialization
- Single sign-on
Correct. One application of federation is single sign-on (SSO) or using one authentication credential to access multiple accounts or applications. SSO holds the promise of reducing the number of usernames and passwords that users must memorize.
How is the Security Assertion Markup Language (SAML) used?
- It is no longer used because it has been replaced by LDAP.
- It serves as a backup to a RADIUS server.
- It is an authenticator in IEEE 802.1x.
- It allows secure web domains to exchange user authentication and authorization data.
Correct. Security Assertion Markup Language (SAML) is an XML standard that allows secure web domains to exchange user authentication and authorization data. This allows a user’s login credentials to be stored with a single identity provider instead of being stored on each web service provider’s server.
In an interview, you are asked to compare the following statements regarding different authentication concepts and identify the correct statement. Which of the following statements is correct?
- Physiological biometrics is relating to the way in which the mind functions.
- A HMAC-based one-time password (HOTP) changes after a set period of time.
- A person’s vein can be used to uniquely authenticate an individual.
- A windowed token displays a static code.
Correct. A person’s vein can be used for authentication.
You are a cyber forensic specialist, and you are asked to retrieve the password of an employee account suspected of being an imposter. As you are provided with the enterprise’s strong password policy, which of the following methods will be the easiest for you to use when retrieving the password?
- Brute force attack
- Hybrid attack
- Rule attack
- Dictionary attack
Correct. Since you know the password policy, conducting a rule attack can retrieve the password easily.
Which of the following is a hardware-based solution for password security?
- Salts
- Password key
- Password digest
- Password vault
Correct. Password keys serve as hardware-based password managers.
In a security review meeting, you proposed using a windowed token with a time-based one-time password (TOTP) to authenticate enterprise employees, and you were asked to explain the working of TOTP.
Which of the following should be your reply?
- With a windowed token with TOTP, a one-time code is generated by the server. The server sends the code to the windowed token. The user enters the code. The user gets authenticated for the correct code.
- With a windowed token with TOTP, a one-time code is generated by the windowed token using a specific algorithm. The server generates the code using a variant of the specific algorithm. The user enters the code. The user is authenticated if the codes match.
- With a windowed token with TOTP, a one-time code is generated by the windowed token using a specific algorithm. The server generates the code using the same algorithm. The user enters the code generated by the windowed token. The user is authenticated if the codes match.
- With a windowed token with TOTP, a one-time code is generated by the windowed token. The windowed token sends the code to the server. The user enters the code generated by the windowed token. The user gets an authentication for the correct code.
With a windowed token with TOTP, a one-time code is generated by the windowed token using a specific algorithm. The server generates the code using the same algorithm. The user enters the code generated by the windowed token. The user is authenticated if the codes match.
Which of the following best describes a preimage attack?
- Cracking picture-based passwords
- Cracking the password by trying all possible alphanumeric combinations
- Embedding password-logging malware in an image file
- Comparing a known digest with an unknown digest
Correct. Preimage attack refers to comparing a known digest with an unknown digest.
Which of the following is the Microsoft version of EAP?
a. EAP-MS
b. AD-EAP
c. PAP-Microsoft
d. MS-CHAP
d. MS-CHAP