Quiz 11 Flashcards

1
Q

he use of what item below involves the creation of a large pre-generated data set of candidate digests?

A) rainbow tables

B) randomized character list

C) word list

D) cascade tables

A

rainbow tables

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The use of one authentication credential to access multiple accounts or applications is referred to as which of the following?

A) individual Sign On

B) single Sign On

C) unilateral Sign On

D) federated Sign On

A

Single Sign On

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What specific type of authentication can be based on where the user is located?

A) GPS

B) somewhere locating

C) geocache

D) geolocation

A

geolocation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Open ID Connect is an Authentication protocol that can be used in OAuth 2.0 as a standard means to obtain user identity.
True
False

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Passwords provide strong protection.
True
False

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Brute force attacks can be very slow because every character combination must be generated.

True
False

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A hardware security token is typically a small device with a window display.

True
False

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A TOTP changes after a set period.

True
False

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Keystroke dynamics uses two unique typing variables.

True
False

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A retina scanner has become the most common type of standard biometrics.

True
False

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Voice recognition is identical to speech recognition.

True
False

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Most password attacks today are an offline attack.

True
False

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What federation system technology uses federation standards to provide SSO and exchanging attributes?
OAuth
Open ID Connect
Windows Live ID
Shibboleth

A

Shibboleth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What option below represents an example of behavioral biometrics?
user dynamics
keystroke dynamics
facial recognition
fingerprint recognition

A

keystroke dynamics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What type of card contains an integrated circuit chip that can hold information, which then can be used as part of the authentication process?
smart card
SIM card
E-card
BioCard

A

smart card

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

If a user has more than one type of authentication credential, what type of authentication is being used?
pattern authentication
verified authentication
multifactor authentication
token authentication

A

multifactor authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which term below describes the time it takes for a key to be pressed and then released?
dwell time
lead time
sync time
react time

A

dwell time

18
Q

What term best describes managing the login credentials such as passwords in user accounts?
account management
user management
credential management
password management

A

credential management

19
Q

A list of the available nonkeyboard characters can be seen in Windows by opening what utility?
charmap.exe
charlist.exe
chardump.exe
listchar.exe

A

charmap.exe

20
Q

What technology is an open source federation framework and supports the development of authorization protocols?
Shibboleth
OAuth
SAML
Kerberos

A

Oauth

21
Q

Which of the following is a category of group password settings in Microsoft Windows? (Choose all that apply.)
Password Policy Settings
Account Policy Settings
Password Lockout Policy
Account Lockout Policy

A

Password Policy Settings,
Account Lockout Policy

22
Q

What type of authentication is based on what the user has?
software token
hardware token
security token
identity token

A

security token

23
Q

What is the main weakness associated with the use of passwords?
human memory
encryption technology
handshake technology
human reliability

A

human memory

24
Q

A secret combination of letters, numbers, and/or characters that only the user should have knowledge of, is known as a:
token
password
biometric detail
challenge

A

password

25
Q

Which of the following are key stretching password hash algorithms? (Choose all that apply.)
bcrypt
PBKDF2
seq02
SHA-256

A

bcrypt
PBKDF2

26
Q

What type of attack conducts a statistical analysis of the stolen passwords that is then used to create a mask to break the largest number of passwords?
character set attack
binary attack
mask attack
rule attack

A

rule attack

27
Q

Which of the following account lockout policy settings determines the number of failed login attempts before a lockout occurs?
system lockout threshold
account lockout threshold
administrator lockout threshold
user lockout threshold

A

account lockout threshold

28
Q

Which of the following is NOT a valid biometric disadvantage?
crossover error rate
false acceptance rate
false error rate
false rejection rate

A

false error rate

29
Q

What federated identity management (FIM) relies on token credentials?
OAuth
OpenID
Shibboleth
OpenPass

A

Oauth

30
Q

A U.S. Department of Defense (DoD) smart card that is used for identification of active-duty and reserve military personnel along with civilian employees and special contractors is called:
Common Access Card (CAC)
Identity Validation Card (IVC)
Credential Validation Card (CVC)
Personal Credential Card (PCC)

A

Common Access Card (CAC)

31
Q

Which of the following accounts is a user account that is created explicitly to provide a security context for services running on a server?
service account
shared account
system account
privileged account

A

service account

32
Q

Which type of biometrics is based on the perception, thought process, and understanding of the user?
cognitive biometrics
reactive biometrics
standard biometrics
physical biometrics

A

cognitive biometrics

33
Q

The use of a single authentication credential that is shared across multiple networks is called:
access management
authorization management
identity management
risk management

A

identity management

34
Q

What kind of biometrics utilizes a person’s unique physical characteristics for authentication, such as fingerprints or unique characteristics of a person’s face?
cognitive biometrics
reactive biometrics
standard biometrics
physical biometrics

A

standard biometrics

35
Q

What variation of a dictionary attack involves a dictionary attack combined with a brute force attack, and will slightly alter dictionary words by adding numbers to the end of the password, spelling words backward, slightly misspelling words, or including special characters?
brute force
hash replay
network replay
hybrid

A

hybrid

36
Q

Which of the following is a is a two-way relationship that is automatically created between parent and child domains in a Microsoft Active Directory forest?
double trust
federated trust
transitive trust
domain trust

A

transitive trust

37
Q

What type of attack involves using every possible combination of letters, numbers, and characters to create candidate digests that are then matched against those in a stolen digest file?
Space division
Brute force
Known ciphertext
Known plaintext

A

Brute force

38
Q

What can be used to increase the strength of hashed passwords?
salt
key stretching
double hashing
single crypting

A

salt

39
Q

Hash algorithms like MD5 and SHA are considered secure for creating digests because these hashing algorithms are designed to create a digest as strong as possible.

True
False

A

False

40
Q

Which of the following options prevents a logon after a set number of failed logon attempts within a specified period and can also specify the length of time that the lockout is in force?
password lock
logon lock
password lockout
logon lockout

A

password lockout

41
Q

Which of the following is a two-way relationship that is automatically created between parent and child domains in a Microsoft Active Directory forest?
double trust
transitive trust
federated trust
domain trust

A

transitive trust

42
Q

The use of what item below involves the creation of a large pre-generated data set of candidate digests?
cascade tables
word list
randomized character list
rainbow tables

A

rainbow tables