Part 12 Flashcards

1
Q

How is the Security Assertion Markup Language (SAML) used?

A

It allows secure web domains to exchange user authentication and authorization data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following is the Microsoft version of EAP?

EAP-MS
AD-EAP
PAP-Microsoft
MS-CHAP

A

MS-CHAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following is NOT used for authentication?

Somewhere you are
Something you exhibit
Something you can do
Something you can find

A

Something you can find

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

IIya has been asked to recommend a federation system technology that is an open source federation framework that can support the development of authorization protocols. Which of these technologies would he recommend

OAuth
OpenID
Shibboleth
NTLM

A

OAuth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How is key stretching effective in resisting password attacks?

A

It takes more time to generate candidate password digests.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of these is NOT a reason to create weak passwords

A lengthy and complex password can be difficult to memorize.
A security policy requires a password to be changed regularly
Having multiple passwords makes it hard to remember all of them
The length and complexity required force users to circumvent creating strong passwords.

A

The length and complexity required force users to circumvent creating strong passwords.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Fernando is explaining to a colleague how a password cracker works. Which of the following is a valid statement about password crackers?

Most states prohibit password crackers unless they are used to retrieve a lost password
Due to the advanced capabilities, they require only a small amount of computing power.
A password cracker attempts to uncover the type of hash algorithm that created the digest because once it is known, the password is broken.
A password cracker differ as to how candidates are created.

A

A password cracker differ as to how candidates are created.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which attack uses one or a small number of commonly used passwords to attempt to log in to several different user accounts?

A

Password spraying attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Why are dictionary attacks successful?

A

Users often create passwords from dictionary words

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
Which of these attacks is the last-resort effort in cracking a stolen password digest file?
Hybrid
Mask
Rule List
Brute Force
A

Brute force

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
Which of the following should NOT be stored in a secure password database?
Iterations
Password digest
Salt
Plaintext password
A

Plaintext password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
Which of the following is NOT an MFA using smartphone?
Authentication app
Biometric gait analysis
SMS text message
Automated phone call
A

Biometric gait analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
Timur was making a presentation regarding how attackers break passwords. His presentation demonstrated the attack  technique that is the slowest yet most thorough attack that is used against passwords. Which of these password attacks did he demonstrate? 
Dictionary attack
Hybrid attack
Custom attack
Brute Force attack
A

Brute force attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which human characteristic is NOT used for biometric identification?

A

Height

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

____ biometric is related to the perception, thought processes, and understanding of the user.

A

Cognitive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
Which of the following is an authentication credential used to access multiple accounts or applications?
Single sign-on
Credentialization
identification authentication
federal login
A

single sign-on

17
Q

What is a disadvantage of biometric readers?

A

Cost

18
Q
Which of these creates a format of the candidate password to significantly reduce the time needed to crack a password?
Rainbow
Mask
Overlay
Pass the hash
A

Mask

19
Q

Pablo has been asked to look into security keys that have a feature of a key pair that is “burned” into the security key during manufacturing time and is specific to a device model. What feature is this?

A

Attestation

20
Q

Which one-time password is event driven?

A

HOTP