logo image

security chapter 12

OpenID is an example of a web-based federated identity management (FIM) system.?
True
False
True
Which term below describes the time it takes for a key to be pressed and then released?
Dwell time
Lead time
Sync time
Show time
Dwell time
What kind of biometrics utilizes a person’s unique physical characteristics for authentication, such as fingerprints or unique characteristics of a person’s face?
Cognitive biometrics
Reactive biometrics
Standard biometrics
Affective biometrics
Standard biometrics
What variation of a dictionary attack involves a dictionary attack combined with a brute force attack, and will slightly alter dictionary words by adding numbers to the end of the password, spelling words backward, slightly misspelling words, or including special characters?
brute force
hash replay
network replay
hybrid
hybrid
?A list of the available nonkeyboard characters can be seen in Windows by opening what utility?
?charmap.exe
?charlist.exe
?chardump.exe
?listchar.exe
charmap.exe
?A U.S. Department of Defense (DoD) smart card that is used for identification of active-duty and reserve military personnel along with civilian employees and special contractors is called:
?Common Access Card (CAC)
?Identity Validation Card (IVC)
?Credential Validation Card (CVC)
?Personal Credential Card (PCC)
?Common Access Card (CAC)
A secret combination of letters, numbers, and/or characters that only the user should have knowledge of, is known as a:
token
password
biometric detail
challenge
password
Token credentials can be revoked at any time by the user without affecting other token credentials issued to other sites.
True
False
Token credentials can be revoked at any time by the user without affecting other token credentials issued to other sites.
The use of one authentication credential to access multiple accounts or applications is referred to as?
Individual Sign On
Single Sign On
Unilateral Sign On
Federated Sign On
Single Sign On
Geolocation is the identification of the location of a person or object using technology, and can be used as part of an authentication method.?
True
False
True
What is the center of the weakness of passwords?
human memory
encryption technology
handshake technology
human reliability
human memory
What type of attack involves using every possible combination of letters, numbers, and characters to create candidate digests that are then matched against those in a stolen digest file?
Space division
Brute force
Known ciphertext
Known plaintext
Brute force
Passwords provide strong protection.
True
False
False
The use of a single authentication credential that is shared across multiple networks is called:
Access management
Authorization management
Identity management
Risk management
Identity management
What technology allows users to share resources stored on one site with a second site without forwarding their authentication credentials to the other site?
OpenAuth
OAuth
SAML
Kerberos
OAuth
Using a rainbow table to crack a password requires three steps: Creation of the table, comparing the table to known hash values, and decrypting the password.
True
False
False
?What federated identity management (FIM) relies on token credentials?
?OAuth
?OpenID
?Windows Live
?OpenPass
OAuth
Passwords that are transmitted can be captured by what type of software?
application analyzer
system analyzer
function analyzer
protocol analyzer
protocol analyzer
?Select below the decentralized open-source FIM that does not require specific software to be installed on the desktop:
?OAuth
?OpenID
?Windows Live ID
?OpenPass
OpenID
The use of what item below involves the creation of a large pregenerated data set of candidate digests?
Rainbow tables
Randomized character list
Word list
Cascade tables
Rainbow tables
Using one authentication credential to access multiple accounts or applications
Single sign-on
Five elements that can prove the genuineness of a user: what you know, what you have, what you are, what you do, and where you are.
authentication factors
A small device that can be affixed to a keychain with a window display that shows a code to be used for authentication.
token
A password attack in which every possible combination of letters, numbers, and characters is used to create encrypted passwords that are matched against those in a stolen password file.
brute force attack
A password hashing algorithm that requires significantly more time than standard hashing algorithms to create the digest
key stretching
A popular key stretching password hash algorithm.
Bcrypt
A random string that is used in hash algorithms.
salt
A password attack that slightly alters dictionary words by adding numbers to the end of the password, spelling words backward, slightly mispelling words, or including special characters.
hybrid attack
A hash used by modern Microsoft Windows operating systems for creating password digests.
NTLM (new technology LAN Manager) hash
A password attack that creates encrypted versions of common dictionary words and compares them against those in a stolen password file..
Dictionary attack

Need essay sample on "security chapter 12"? We will write a custom essay sample specifically for you for only $ 13.90/page

Can’t wait to take that assignment burden offyour shoulders?

Let us know what it is and we will show you how it can be done!
×
Sorry, but copying text is forbidden on this website. If you need this or any other sample, please register

Already on Businessays? Login here

No, thanks. I prefer suffering on my own
Sorry, but copying text is forbidden on this website. If you need this or any other sample register now and get a free access to all papers, carefully proofread and edited by our experts.
Sign in / Sign up
No, thanks. I prefer suffering on my own
Not quite the topic you need?
We would be happy to write it
Join and witness the magic
Service Open At All Times
|
Complete Buyer Protection
|
Plagiarism-Free Writing

Emily from Businessays

Hi there, would you like to get such a paper? How about receiving a customized one? Check it out https://goo.gl/chNgQy

We use cookies to give you the best experience possible. By continuing we’ll assume you’re on board with our cookie policy