Security Module 12 Flashcards
Which of the following does not take into consideration upper and lowercase letters during the cryptographic function?
LAN Manager hash
Which of the following is a secure methodology when using a password?
Never writing a password down
How do keystroke dynamics determine whether to authenticate an individual or not?
With dwell and flight time
Which of the following is NOT a hash?
LM
How would a user view a list of non-keyboard characters?
Via charmap.exe
What device can be used to create an OTP?
Token
Microsoft implemented the use of multiple password policies within one domain starting with which version of Windows?
Windows Server 2008
An attacker is least likely to use which password discovery method when compromising a strong password?
Brute-force
In respect to security, why is it better to use password management applications to store passwords rather than utilizing a web browser function?
Application store passwords in a user vault file
Which of the following is the fastest, most efficient offline password cracking technique
Rainbow Tables
Why would an administrator resort to key stretching algorithms as opposed to general-purpose algorithms such as MD5?
Key stretching algorithms are slower
Which of the following is a true statement about salts?
Salts can change identical passwords
Which of the following authentication methods are prone to errors?
Standard biometrics
Single sign-on allows users to authenticate across multiple networks and requires what to function?
FIM
Which of the following authentication method combinations is an example of multifactor authentication?
TOTP, password, and a username