Security Module 12 Flashcards

1
Q

Which of the following does not take into consideration upper and lowercase letters during the cryptographic function?

A

LAN Manager hash

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following is a secure methodology when using a password?

A

Never writing a password down

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How do keystroke dynamics determine whether to authenticate an individual or not?

A

With dwell and flight time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following is NOT a hash?

A

LM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How would a user view a list of non-keyboard characters?

A

Via charmap.exe

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What device can be used to create an OTP?

A

Token

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Microsoft implemented the use of multiple password policies within one domain starting with which version of Windows?

A

Windows Server 2008

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

An attacker is least likely to use which password discovery method when compromising a strong password?

A

Brute-force

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

In respect to security, why is it better to use password management applications to store passwords rather than utilizing a web browser function?

A

Application store passwords in a user vault file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following is the fastest, most efficient offline password cracking technique

A

Rainbow Tables

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Why would an administrator resort to key stretching algorithms as opposed to general-purpose algorithms such as MD5?

A

Key stretching algorithms are slower

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following is a true statement about salts?

A

Salts can change identical passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following authentication methods are prone to errors?

A

Standard biometrics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Single sign-on allows users to authenticate across multiple networks and requires what to function?

A

FIM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following authentication method combinations is an example of multifactor authentication?

A

TOTP, password, and a username

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What does Open Authorization rely on to function and share resources across sites?

A

Token credentials

17
Q

Which of the following is considered the strongest password?

A

L*^dns22Oik

18
Q

How does Windows manage credentials in an Active Directory environment?

A

With password setting objects

19
Q

How is an HMAC-based OTP different from a TOTP?

A

HMAC requires an event to change values

20
Q

Authentication factores or credentials assist in verifying which of the following?

A

Genuine identity