Module 12 - Authentication Q Flashcards

1
Q

You are a cyber forensic specialist, and you are asked to retrieve the password of an employee account suspected of being an imposter. As you are provided with the enterprise’s strong password policy, which of the following methods will be the easiest for you to use when retrieving the password?

A

Rule attack

Since you know the password policy, conducting a rule attack can retrieve the password easily

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following best describes a preimage attack?

A

Comparing a known digest with an unknown digest

Preimage attack refers to comparing a known digest with an unknown digest

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following best describes skimming?

A

Capturing information from the magnetic stripe of a smartcard

Skimming refers to capturing information from the magnetic stripe of a smart card to clone the smartcard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

An attacker collected many usernames from a website and tried to login into the accounts using the password “passw0rd”. What type of attack was this?

A

Password spraying

Password spraying attacks try commonly used passwords on different user accounts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

While analyzing a security breach, you found the attacker followed these attack patterns:

The attacker initially tried the commonly used password “passw0rd” on all enterprise user accounts and then started trying various intelligible words like “passive,” “partner,” etc.

Which of the following attacks was performed by the attacker?

A

Initially, a password spraying attack and then a brute force attack

Initially, the attacker performed a password spraying attack by trying the same password on different accounts. Then, they tried a dictionary attack by trying different intelligible words to crack the password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following human characteristic is used for authentication?

A

Veins

Vein images in a user’s palm or finger can be used for authentication and are identified through a vein-scanning tablet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Your enterprise recently approved using fingerprint scanners to authenticate employees who access restricted areas. You are assigned to conduct a study on how secure fingerprint authentication is. Which of the following should you report?

A

Fingerprint scanners can be used for trickery in rare cases

Fingerprint scanners can be used for trickery by collecting an authorized person’s fingerprint and applying it effectively in the scanner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

In a multifactor authentication-enabled facility, you are asked the following question: “What type of food was served on your child’s first birthday?” Which of the following is the authentication method used here?

A

Cognitive biometrics

Cognitive biometrics is related to the perception, thought process, and understanding of the user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

You want to implement an authentication method so that different password attacks, like dictionary attacks, brute force attacks, etc., will not result in unauthorized access to the web application hosted by your enterprise. You want to do this by not using any specialized hardware or making any changes to the user’s activity during the authentication process. Which of the following methods should you apply?

A

You should implement keystroke dynamics

Keystroke dynamics analyze the user’s keystrokes to authenticate the user. This allows multifactor authentication without using specialized hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Sam is working as a cybersecurity expert. An enterprise that manages nuclear powerplants approached Sam’s company to install an authentication facility for its employees when they access the nuclear plant. The enterprise is demanding multifactor authentication with high security, lowest false acceptance rate, and lowest false rejection rates.

Which of the following authentication methods should Sam apply?

A

PIN and gait recognition

Gait recognition cannot be tricked, so the false acceptance and false rejection rates are low

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

In an interview, you were asked to crack a password and told that the password is a commonly used word. Which of the following methods should you apply?

A

You should perform a dictionary attack

Dictionary attacks use common words from the dictionary to crack passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

You are asked to choose a secure authentication method other than a username and password for the employees to access your enterprise’s database. Which of the following should you choose?

A

Security key authentication

Security keys can authenticate a user with one tap and provide suitable security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The following data is being used for a password attack: “?u ?l ?l ?l ?l ?d ?d ?d ?d.”
Which of the following types of attack is this?

A

Rule attack

In a rule attack, password format masks such as “?u ?l ?l ?l ?l ?d ?d ?d ?d” are created to crack the passwords in the above-mentioned scenario

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following can protect a password digest from attackers?

A

Argon2

Argon2 is a key stretching algorithm that can also add salts to provide optimum security for password digests

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following is a hardware-based solution for password security?

A

Password key

Password keys serve as hardware-based password managers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

You want to manage your passwords for different accounts to optimally secure passwords from compromise. Which of the following password management methods should you use?

A

Password key

Since a password key is a hardware-based password management tool, it provides optimum security to the password

17
Q

Ram’s enterprise is hosting a web app that requires authentication. Recently, the password digest files of other enterprises were stolen, and the attackers cracked the passwords with ease. As such, Ram was asked to implement additional security measures for the web app’s passwords. Which of the following methods should Ram apply?

A

He should use Key stretching

Key stretching will slow down the password cracking, even if the password digest is compromised

18
Q

Which of the following is an authentication system that issues a ticket after verifying the credentials by which you can authenticate other services?

A

Kerberos

After successful authentication, Kerberos issues a ticket that allows other services to be accessed

19
Q

You are working as a security expert in an e-commerce enterprise. Your company recently decided on a short-term collaboration with a small business named BuyMe, and the following issue arose. Whenever your customers purchase any product from BuyMe, the e-commerce website redirects them to the BuyMe website, asking for additional authentication. This results in customers abandoning their purchases. To solve this issue, both enterprises agree to use a single authentication process wherein the users, once logged in to your website, can purchase from BuyMe without additional steps.

How should you implement this without storing the customers’ credentials on the BuyMe server?

A

Use SAML

Simple assertion markup language (SAML) is an XML standard that allows secure web domains to exchange user authentication and authorization data so that the credentials from your e-commerce servers can be temporarily transferred to the BuyMe server for authentication

20
Q

Windows picture password belongs to which of the following?

A

Cognitive biometrics

Windows picture password is a cognitive biometric, or knowledge-based authentication, method

21
Q

In an interview, you are asked to compare the following statements regarding different authentication concepts and identify the correct statement. Which of the following statements is correct?

A

A person’s vein can be used to uniquely authenticate an individual

A person’s vein can be used for authentication

22
Q

The following statements regarding centralized administration concepts are presented to you in an interview in which only one of them is correct. Which of these is correct?

A

Extensible authentication protocol is a framework to transport authentication protocols

The extensible authentication protocol (EAP) is a framework that is used to transport authentication protocols

23
Q

In a security review meeting, you proposed using a windowed token with a time-based one-time password (TOTP) to authenticate enterprise employees, and you were asked to explain the working of TOTP.

Which of the following should be your reply?

A

With a windowed token with TOTP, a one-time code is generated by the windowed token using a specific algorithm. The server generates the code using the same algorithm. The user enters the code generated by the windowed token. The user is authenticated if the codes match

Both the windowed token and the authentication server generate the code by using the same algorithm and time, and the user must enter the code within a short time frame. If the code entered by the user matches, the user is authenticated

24
Q

You are working as a security admin in an enterprise. While you were analyzing different password attacks, you found that whenever an individual user’s password gets cracked, another user with the same password residing in the same password digest file also has their account compromised. How should you prevent this from happening in the future?

A

You should add salt to the passwords before hashing

Adding salt will make every password unique

25
Q

Which of the following authentication methods belongs in the “something you have” category?

A

Security key

Security keys are hardware devices that users physically possess

26
Q

Which of the following is an authentication system that uses UDP over TCP?

A

RADIUS

RADIUS uses UDP as the transport protocol

27
Q

How does the single sign-on enhance secure authentication?

A

Implementing a single sign-on will reduce the number of passwords needing to be remembered

When single sign-on is used, only a smaller number of passwords need to be remembered and can set different complex passwords for different services

28
Q

Which of the following is a motherboard chip that provides cryptographic services?

A

Trusted platform module

The trusted platform module (TPM) is a chip on a computer’s motherboard that provides cryptographic services

29
Q

In an interview, you were asked to choose the least vulnerable password from the following list. Which of the following should you choose?

A

earthwaterforesttreemanworldkid

This is less complex, but it is the lengthiest password, making it less vulnerable than the others

30
Q

In an interview, you were asked to explain the steps involved in a successful authentication by a RADIUS server. How should you answer?

A

The supplicant sends a request to the access point (AP). The AP prompts the user for credentials. Once credentials are entered, the AP sends an authentication request to the RADIUS server. If verified, the server sends the authentication acknowledgment to the AP. The user is then authorized to join the network

These are the steps involved in a successful authentication by a RADIUS server