logo image

Chapter 12 – Authentication and Account Management

A secret combination of letters, numbers, and/or characters that only the user should have knowledge of, is known as a:

token
password
Biometric detail
challenge

password
What is the center of the weakness of passwords?

human memory
encryption technology
handshake technology
human reliability

human memory
Passwords that are transmitted can be captured by what type of software?

application analyzer
system analyzer
function analyzer
protocol analyzer

protocol analyzer
What type of attack involves an attacker stealing a file containing password digests and comparing the digests with digests created by the attacker?

offline cracking
online cracking
hash replay
token replay

offline cracking
What type of attack involves using every possible combination of letters, numbers, and characters to create candidate digests that are then matched against those in a stolen digest file?

Space division
Brute force
Known ciphertext
Known plaintext

Brute force
What variation of a dictionary attack involves a dictionary attack combined with a brute force attack, and will slightly alter dictionary words by adding numbers to the end of the password, spelling words backward, slightly misspelling words, or including special characters?

brute force
hash replay
network replay
hybrid

hybrid
The use of what item below involves the creation of a large pregenerated data set of candidate digests?

Rainbow tables
Randomized character list
Word list
Cascade tables

Rainbow tables
What kind of biometrics utilizes a person’s unique physical characteristics for authentication, such as fingerprints or unique characteristics of a person’s face?

Cognitive biometrics
Reactive biometrics
Standard biometrics
Affective biometrics

Standard biometrics
Which term below describes the time it takes for a key to be pressed and then released?

Dwell time
Lead time
Sync time
Show time

Dwell time
Which type of biometrics is based on the perception, thought process, and understanding of the user?

Standard biometrics
Reactive biometrics
Cognitive biometrics
Affective biometrics

Cognitive biometrics
The use of a single authentication credential that is shared across multiple networks is called:

Access management
Authorization management
Identity management
Risk management

Identity management
The use of one authentication credential to access multiple accounts or applications is referred to as?

Individual Sign On
Single Sign On
Unilateral Sign On
Federated Sign On

Single Sign On
What technology allows users to share resources stored on one site with a second site without forwarding their authentication credentials to the other site?

OpenAuth
OAuth
SAML
Kerberos

OAuth
?Select below the decentralized open-source FIM that does not require specific software to be installed on the desktop:

?OAuth
?OpenID
?Windows Live ID
?OpenPass

?OpenID
?What federated identity management (FIM) relies on token credentials?

?OAuth
?OpenID
?Windows Live
?OpenPass

?OAuth
?A U.S. Department of Defense (DoD) smart card that is used for identification of active-duty and reserve military personnel along with civilian employees and special contractors is called:

?Common Access Card (CAC)
?Identity Validation Card (IVC)
?Credential Validation Card (CVC)
?Personal Credential Card (PCC)

?Common Access Card (CAC)
What can be used to increase the strength of hashed passwords??

?Salt
?Key stretching
?Double hashing
Crypting

?Salt
?A list of the available nonkeyboard characters can be seen in Windows by opening what utility?

?charmap.exe
?charlist.exe
?chardump.exe
?listchar.exe

?charmap.exe
Which hashing algorithm below is used with NTLMv2’s Hashed Message Authentication Code?

?SHA-1
?SHA-256
?MD4
?MD5

?MD5
?What type of one-time password (OTP) changes after a set time period?

?HMAC-Based one-time password (HOTP)
?Period-based one-time password (POTP)
?Time-based one-time password (TOTP)
?Interval-based one-time password (IOTP)

?HMAC-Based one-time password (HOTP)

Need essay sample on "Chapter 12 – Authentication and Account Management"? We will write a custom essay sample specifically for you for only $ 13.90/page

Can’t wait to take that assignment burden offyour shoulders?

Let us know what it is and we will show you how it can be done!
×
Sorry, but copying text is forbidden on this website. If you need this or any other sample, please register

Already on Businessays? Login here

No, thanks. I prefer suffering on my own
Sorry, but copying text is forbidden on this website. If you need this or any other sample register now and get a free access to all papers, carefully proofread and edited by our experts.
Sign in / Sign up
No, thanks. I prefer suffering on my own
Not quite the topic you need?
We would be happy to write it
Join and witness the magic
Service Open At All Times
|
Complete Buyer Protection
|
Plagiarism-Free Writing

Emily from Businessays

Hi there, would you like to get such a paper? How about receiving a customized one? Check it out https://goo.gl/chNgQy

We use cookies to give you the best experience possible. By continuing we’ll assume you’re on board with our cookie policy