Module 12 - Authentication Q Flashcards
You are a cyber forensic specialist, and you are asked to retrieve the password of an employee account suspected of being an imposter. As you are provided with the enterprise’s strong password policy, which of the following methods will be the easiest for you to use when retrieving the password?
Rule attack
Since you know the password policy, conducting a rule attack can retrieve the password easily
Which of the following best describes a preimage attack?
Comparing a known digest with an unknown digest
Preimage attack refers to comparing a known digest with an unknown digest
Which of the following best describes skimming?
Capturing information from the magnetic stripe of a smartcard
Skimming refers to capturing information from the magnetic stripe of a smart card to clone the smartcard
An attacker collected many usernames from a website and tried to login into the accounts using the password “passw0rd”. What type of attack was this?
Password spraying
Password spraying attacks try commonly used passwords on different user accounts
While analyzing a security breach, you found the attacker followed these attack patterns:
The attacker initially tried the commonly used password “passw0rd” on all enterprise user accounts and then started trying various intelligible words like “passive,” “partner,” etc.
Which of the following attacks was performed by the attacker?
Initially, a password spraying attack and then a brute force attack
Initially, the attacker performed a password spraying attack by trying the same password on different accounts. Then, they tried a dictionary attack by trying different intelligible words to crack the password
Which of the following human characteristic is used for authentication?
Veins
Vein images in a user’s palm or finger can be used for authentication and are identified through a vein-scanning tablet
Your enterprise recently approved using fingerprint scanners to authenticate employees who access restricted areas. You are assigned to conduct a study on how secure fingerprint authentication is. Which of the following should you report?
Fingerprint scanners can be used for trickery in rare cases
Fingerprint scanners can be used for trickery by collecting an authorized person’s fingerprint and applying it effectively in the scanner
In a multifactor authentication-enabled facility, you are asked the following question: “What type of food was served on your child’s first birthday?” Which of the following is the authentication method used here?
Cognitive biometrics
Cognitive biometrics is related to the perception, thought process, and understanding of the user
You want to implement an authentication method so that different password attacks, like dictionary attacks, brute force attacks, etc., will not result in unauthorized access to the web application hosted by your enterprise. You want to do this by not using any specialized hardware or making any changes to the user’s activity during the authentication process. Which of the following methods should you apply?
You should implement keystroke dynamics
Keystroke dynamics analyze the user’s keystrokes to authenticate the user. This allows multifactor authentication without using specialized hardware
Sam is working as a cybersecurity expert. An enterprise that manages nuclear powerplants approached Sam’s company to install an authentication facility for its employees when they access the nuclear plant. The enterprise is demanding multifactor authentication with high security, lowest false acceptance rate, and lowest false rejection rates.
Which of the following authentication methods should Sam apply?
PIN and gait recognition
Gait recognition cannot be tricked, so the false acceptance and false rejection rates are low
In an interview, you were asked to crack a password and told that the password is a commonly used word. Which of the following methods should you apply?
You should perform a dictionary attack
Dictionary attacks use common words from the dictionary to crack passwords
You are asked to choose a secure authentication method other than a username and password for the employees to access your enterprise’s database. Which of the following should you choose?
Security key authentication
Security keys can authenticate a user with one tap and provide suitable security
The following data is being used for a password attack: “?u ?l ?l ?l ?l ?d ?d ?d ?d.”
Which of the following types of attack is this?
Rule attack
In a rule attack, password format masks such as “?u ?l ?l ?l ?l ?d ?d ?d ?d” are created to crack the passwords in the above-mentioned scenario
Which of the following can protect a password digest from attackers?
Argon2
Argon2 is a key stretching algorithm that can also add salts to provide optimum security for password digests
Which of the following is a hardware-based solution for password security?
Password key
Password keys serve as hardware-based password managers