Exam 10: Authentication and Account Management

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

An operating system that has been reengineered so that it is designed to be secure from the ground up is known as a ____.

Free
(Multiple Choice)
4.8/5
(30)
Correct Answer:
Verified

D

It is predicted that ____ could become a key element in authentication in the future.

Free
(Multiple Choice)
4.9/5
(28)
Correct Answer:
Verified

A

____ accepts spoken words for input as if they had been typed on the keyboard.

Free
(Multiple Choice)
4.9/5
(41)
Correct Answer:
Verified

D

Passwords provide strong protection.

(True/False)
4.9/5
(39)

In most systems, a user logging in would be asked to ____________________ herself.

(Short Answer)
5.0/5
(41)

Microsoft is Windows ____ is a feature of Windows that is intended to provide users with control of their digital identities while helping them to manage privacy.

(Multiple Choice)
4.9/5
(33)
Match each term with the correct statement below.
A government standard for smart cards that covers all government employees
CAC
A Department of Defense (DoD) smart card used for identification for active-duty and reserve military personnel along with civilian employees and special contractors
Standard biometrics
A password attack in which every possible combination of letters, numbers, and characters is used to create encrypted passwords that are matched with those in a stolen password file
Account Lockout Policy
Correct Answer:
Verified
Premises:
Responses:
A government standard for smart cards that covers all government employees
CAC
A Department of Defense (DoD) smart card used for identification for active-duty and reserve military personnel along with civilian employees and special contractors
Standard biometrics
A password attack in which every possible combination of letters, numbers, and characters is used to create encrypted passwords that are matched with those in a stolen password file
Account Lockout Policy
Prevents a logon after a set number of failed logon attempts within a specified period
Behavioral biometrics
Authenticating a user by the normal actions that the user performs
Token
Make password attacks easier by creating a large pregenerated data set of encrypted passwords
Rainbow tables
A small device that can be affixed to a keychain with a window display that shows a code to be used for authentication
Hybrid
A password attack that slightly alters dictionary words by adding numbers to the end of the password, spelling words backward, slightly misspelling words, or including special characters
Brute force
(Matching)
4.8/5
(32)

Explain how an attacker can use a resetting attack.

(Essay)
4.8/5
(43)

Using a rainbow table to crack a password requires three steps.

(True/False)
4.9/5
(31)

To create a rainbow table, each ____ begins with an initial password that is encrypted.

(Multiple Choice)
5.0/5
(40)

List and describe two of the common password setting objects.

(Essay)
4.8/5
(35)

____ is the time it takes for a key to be pressed and then released.

(Multiple Choice)
4.8/5
(40)

____ is related to the perception, thought process, and understanding of the user.

(Multiple Choice)
4.8/5
(27)

What are the three advantages of a rainbow table over other password attacks?

(Essay)
4.8/5
(28)

Discuss the focus of the OS vendors developing trusted OSs.

(Essay)
4.9/5
(31)

A token ____________________ is a unique random string of characters that is encrypted to protect the token from being used by unauthorized parties.

(Short Answer)
4.8/5
(40)

Identify two basic flows that operating systems can have.

(Essay)
4.9/5
(37)

Describe how rainbow tables work.

(Essay)
4.9/5
(35)

What are the three broad categories on which authentication can be based?

(Essay)
4.7/5
(36)

Today's operating systems have roots dating back 20 or more years, well before security was identified as a critical process.

(True/False)
4.8/5
(44)
Showing 1 - 20 of 42
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)