Quiz 11 Flashcards
he use of what item below involves the creation of a large pre-generated data set of candidate digests?
A) rainbow tables
B) randomized character list
C) word list
D) cascade tables
rainbow tables
The use of one authentication credential to access multiple accounts or applications is referred to as which of the following?
A) individual Sign On
B) single Sign On
C) unilateral Sign On
D) federated Sign On
Single Sign On
What specific type of authentication can be based on where the user is located?
A) GPS
B) somewhere locating
C) geocache
D) geolocation
geolocation
Open ID Connect is an Authentication protocol that can be used in OAuth 2.0 as a standard means to obtain user identity.
True
False
True
Passwords provide strong protection.
True
False
False
Brute force attacks can be very slow because every character combination must be generated.
True
False
True
A hardware security token is typically a small device with a window display.
True
False
True
A TOTP changes after a set period.
True
False
True
Keystroke dynamics uses two unique typing variables.
True
False
True
A retina scanner has become the most common type of standard biometrics.
True
False
False
Voice recognition is identical to speech recognition.
True
False
False
Most password attacks today are an offline attack.
True
False
True
What federation system technology uses federation standards to provide SSO and exchanging attributes?
OAuth
Open ID Connect
Windows Live ID
Shibboleth
Shibboleth
What option below represents an example of behavioral biometrics?
user dynamics
keystroke dynamics
facial recognition
fingerprint recognition
keystroke dynamics
What type of card contains an integrated circuit chip that can hold information, which then can be used as part of the authentication process?
smart card
SIM card
E-card
BioCard
smart card
If a user has more than one type of authentication credential, what type of authentication is being used?
pattern authentication
verified authentication
multifactor authentication
token authentication
multifactor authentication
Which term below describes the time it takes for a key to be pressed and then released?
dwell time
lead time
sync time
react time
dwell time
What term best describes managing the login credentials such as passwords in user accounts?
account management
user management
credential management
password management
credential management
A list of the available nonkeyboard characters can be seen in Windows by opening what utility?
charmap.exe
charlist.exe
chardump.exe
listchar.exe
charmap.exe
What technology is an open source federation framework and supports the development of authorization protocols?
Shibboleth
OAuth
SAML
Kerberos
Oauth
Which of the following is a category of group password settings in Microsoft Windows? (Choose all that apply.)
Password Policy Settings
Account Policy Settings
Password Lockout Policy
Account Lockout Policy
Password Policy Settings,
Account Lockout Policy
What type of authentication is based on what the user has?
software token
hardware token
security token
identity token
security token
What is the main weakness associated with the use of passwords?
human memory
encryption technology
handshake technology
human reliability
human memory
A secret combination of letters, numbers, and/or characters that only the user should have knowledge of, is known as a:
token
password
biometric detail
challenge
password
Which of the following are key stretching password hash algorithms? (Choose all that apply.)
bcrypt
PBKDF2
seq02
SHA-256
bcrypt
PBKDF2
What type of attack conducts a statistical analysis of the stolen passwords that is then used to create a mask to break the largest number of passwords?
character set attack
binary attack
mask attack
rule attack
rule attack
Which of the following account lockout policy settings determines the number of failed login attempts before a lockout occurs?
system lockout threshold
account lockout threshold
administrator lockout threshold
user lockout threshold
account lockout threshold
Which of the following is NOT a valid biometric disadvantage?
crossover error rate
false acceptance rate
false error rate
false rejection rate
false error rate
What federated identity management (FIM) relies on token credentials?
OAuth
OpenID
Shibboleth
OpenPass
Oauth
A U.S. Department of Defense (DoD) smart card that is used for identification of active-duty and reserve military personnel along with civilian employees and special contractors is called:
Common Access Card (CAC)
Identity Validation Card (IVC)
Credential Validation Card (CVC)
Personal Credential Card (PCC)
Common Access Card (CAC)
Which of the following accounts is a user account that is created explicitly to provide a security context for services running on a server?
service account
shared account
system account
privileged account
service account
Which type of biometrics is based on the perception, thought process, and understanding of the user?
cognitive biometrics
reactive biometrics
standard biometrics
physical biometrics
cognitive biometrics
The use of a single authentication credential that is shared across multiple networks is called:
access management
authorization management
identity management
risk management
identity management
What kind of biometrics utilizes a person’s unique physical characteristics for authentication, such as fingerprints or unique characteristics of a person’s face?
cognitive biometrics
reactive biometrics
standard biometrics
physical biometrics
standard biometrics
What variation of a dictionary attack involves a dictionary attack combined with a brute force attack, and will slightly alter dictionary words by adding numbers to the end of the password, spelling words backward, slightly misspelling words, or including special characters?
brute force
hash replay
network replay
hybrid
hybrid
Which of the following is a is a two-way relationship that is automatically created between parent and child domains in a Microsoft Active Directory forest?
double trust
federated trust
transitive trust
domain trust
transitive trust
What type of attack involves using every possible combination of letters, numbers, and characters to create candidate digests that are then matched against those in a stolen digest file?
Space division
Brute force
Known ciphertext
Known plaintext
Brute force
What can be used to increase the strength of hashed passwords?
salt
key stretching
double hashing
single crypting
salt
Hash algorithms like MD5 and SHA are considered secure for creating digests because these hashing algorithms are designed to create a digest as strong as possible.
True
False
False
Which of the following options prevents a logon after a set number of failed logon attempts within a specified period and can also specify the length of time that the lockout is in force?
password lock
logon lock
password lockout
logon lockout
password lockout
Which of the following is a two-way relationship that is automatically created between parent and child domains in a Microsoft Active Directory forest?
double trust
transitive trust
federated trust
domain trust
transitive trust
The use of what item below involves the creation of a large pre-generated data set of candidate digests?
cascade tables
word list
randomized character list
rainbow tables
rainbow tables