Quiz 11 Flashcards
he use of what item below involves the creation of a large pre-generated data set of candidate digests?
A) rainbow tables
B) randomized character list
C) word list
D) cascade tables
rainbow tables
The use of one authentication credential to access multiple accounts or applications is referred to as which of the following?
A) individual Sign On
B) single Sign On
C) unilateral Sign On
D) federated Sign On
Single Sign On
What specific type of authentication can be based on where the user is located?
A) GPS
B) somewhere locating
C) geocache
D) geolocation
geolocation
Open ID Connect is an Authentication protocol that can be used in OAuth 2.0 as a standard means to obtain user identity.
True
False
True
Passwords provide strong protection.
True
False
False
Brute force attacks can be very slow because every character combination must be generated.
True
False
True
A hardware security token is typically a small device with a window display.
True
False
True
A TOTP changes after a set period.
True
False
True
Keystroke dynamics uses two unique typing variables.
True
False
True
A retina scanner has become the most common type of standard biometrics.
True
False
False
Voice recognition is identical to speech recognition.
True
False
False
Most password attacks today are an offline attack.
True
False
True
What federation system technology uses federation standards to provide SSO and exchanging attributes?
OAuth
Open ID Connect
Windows Live ID
Shibboleth
Shibboleth
What option below represents an example of behavioral biometrics?
user dynamics
keystroke dynamics
facial recognition
fingerprint recognition
keystroke dynamics
What type of card contains an integrated circuit chip that can hold information, which then can be used as part of the authentication process?
smart card
SIM card
E-card
BioCard
smart card
If a user has more than one type of authentication credential, what type of authentication is being used?
pattern authentication
verified authentication
multifactor authentication
token authentication
multifactor authentication
Which term below describes the time it takes for a key to be pressed and then released?
dwell time
lead time
sync time
react time
dwell time
What term best describes managing the login credentials such as passwords in user accounts?
account management
user management
credential management
password management
credential management
A list of the available nonkeyboard characters can be seen in Windows by opening what utility?
charmap.exe
charlist.exe
chardump.exe
listchar.exe
charmap.exe
What technology is an open source federation framework and supports the development of authorization protocols?
Shibboleth
OAuth
SAML
Kerberos
Oauth
Which of the following is a category of group password settings in Microsoft Windows? (Choose all that apply.)
Password Policy Settings
Account Policy Settings
Password Lockout Policy
Account Lockout Policy
Password Policy Settings,
Account Lockout Policy
What type of authentication is based on what the user has?
software token
hardware token
security token
identity token
security token
What is the main weakness associated with the use of passwords?
human memory
encryption technology
handshake technology
human reliability
human memory
A secret combination of letters, numbers, and/or characters that only the user should have knowledge of, is known as a:
token
password
biometric detail
challenge
password