logo image

Cyber Security//Exam 3 – CH.12 Mod.1 – PP & Quiz

OAuth
1. what technology allows users to share resources stored on one site with a second site without forwarding their authentication credentials to the other site?

– SAML
– Kerberos
– OAuth
– OpenAuth

(Ch.12 Mod.1 – Online Quiz)

charmap.exe
2. ?a list of the available nonkeyboard characters can be seen in Windows by opening what utility?

– charmap.exe
– chardump.exe
– ?listchar.exe
– ?charlist.exe

(Ch.12 Mod.1 – Online Quiz)

True
3. T/F – OpenID is an example of a web-based federated identity management (FIM) system

(Ch.12 Mod.1 – Online Quiz)

Identity management
4. the use of a single authentication credential that is shared across multiple networks is called:

– Authorization management
– Identity management
– Access management
– Risk management

(Ch.12 Mod.1 – Online Quiz)

True
5. T/F – geolocation is the identification of the location of a person or object using technology, and can be used as part of an authentication method

(Ch.12 Mod.1 – Online Quiz)

OAuth
6. what federated identity management (FIM) relies on token credentials?

– Windows Live
– OAuth
– ?OpenID
– ?OpenPass

(Ch.12 Mod.1 – Online Quiz)

MD5
7. which hashing algorithm below is used with NTLMv2’s Hashed Message Authentication Code?

– SHA-1
– MD5
– SHA-256
– ?MD4

(Ch.12 Mod.1 – Online Quiz)

protocol analyzer
8. passwords that are transmitted can be captured by what type of software?

– function analyzer
– application analyzer
– system analyzer
– protocol analyzer

(Ch.12 Mod.1 – Online Quiz)

salt
9. what can be used to increase the strength of hashed passwords??

– Salt
– Key stretching
– Crypting
– Double hashing

(Ch.12 Mod.1 – Online Quiz)

password
10. a secret combination of letters, numbers, and/or characters that only the user should have knowledge of, is known as a:

– biometric detail
– token
– challenge
– password

(Ch.12 Mod.1 – Online Quiz)

Brute force
11. what type of attack involves using every possible combination of letters, numbers, and characters to create candidate digests that are then matched against those in a stolen digest file?

– Space division
– Brute force
– Known ciphertext
– Known plaintext

(Ch.12 Mod.1 – Online Quiz)

offline cracking
12. what type of attack involves an attacker stealing a file containing password digests and comparing the digests with digests created by the attacker?

– offline cracking
– online cracking
– hash replay
– token replay

(Ch.12 Mod.1 – Online Quiz)

HMAC-Based one-time password (HOTP)
13. what type of one-time password (OTP) changes after a set time period?

– HMAC-Based one-time password (HOTP)
– period-based one-time password (POTP)
– time-based one-time password (TOTP)
– interval-based one-time password (IOTP)

(Ch.12 Mod.1 – Online Quiz)

False
14. T/F – using a rainbow table to crack a password requires three steps: Creation of the table, comparing the table to known hash values, and decrypting the password

(Ch.12 Mod.1 – Online Quiz)

Standard biometrics
15. what kind of biometrics utilizes a person’s unique physical characteristics for authentication, such as fingerprints or unique characteristics of a person’s face?

– Affective biometrics
– Standard biometrics
– Reactive biometrics
– Cognitive biometrics

(Ch.12 Mod.1 – Online Quiz)

Common Access Card (CAC)
16. a U.S. Department of Defense (DoD) smart card that is used for identification of active-duty and reserve military personnel along with civilian employees and special contractors is called:

– Identity Validation Card (IVC)
– Personal Credential Card (PCC)
– Credential Validation Card (CVC)
– ?Common Access Card (CAC)

(Ch.12 Mod.1 – Online Quiz)

OpenID
17. select below the decentralized open-source FIM that does not require specific software to be installed on the desktop:

– OpenPass
– OAuth
– Windows Live ID
– ?OpenID

(Ch.12 Mod.1 – Online Quiz)

Need essay sample on "Cyber Security//Exam 3 – CH.12 Mod.1 – PP & Quiz"? We will write a custom essay sample specifically for you for only $ 13.90/page

Can’t wait to take that assignment burden offyour shoulders?

Let us know what it is and we will show you how it can be done!
×
Sorry, but copying text is forbidden on this website. If you need this or any other sample, please register

Already on Businessays? Login here

No, thanks. I prefer suffering on my own
Sorry, but copying text is forbidden on this website. If you need this or any other sample register now and get a free access to all papers, carefully proofread and edited by our experts.
Sign in / Sign up
No, thanks. I prefer suffering on my own
Not quite the topic you need?
We would be happy to write it
Join and witness the magic
Service Open At All Times
|
Complete Buyer Protection
|
Plagiarism-Free Writing

Emily from Businessays

Hi there, would you like to get such a paper? How about receiving a customized one? Check it out https://goo.gl/chNgQy

We use cookies to give you the best experience possible. By continuing we’ll assume you’re on board with our cookie policy