Exam 10: Authentication and Account Management
Exam 1: Introduction to Security42 Questions
Exam 2: Malware and Social Engineering Attacks42 Questions
Exam 3: Application and Network Attacks42 Questions
Exam 4: Vulnerability Assessment and Mitigating Attacks42 Questions
Exam 5: Host, Application, and Data Security42 Questions
Exam 6: Network Security42 Questions
Exam 7: Administering a Secure Network42 Questions
Exam 8: Wireless Network Security42 Questions
Exam 9: Access Control Fundamentals42 Questions
Exam 10: Authentication and Account Management42 Questions
Exam 11: Basic Cryptography42 Questions
Exam 12: Advanced Cryptography42 Questions
Exam 13: Business Continuity42 Questions
Exam 14: Risk Mitigation42 Questions
Select questions type
An operating system that has been reengineered so that it is designed to be secure from the ground up is known as a ____.
Free
(Multiple Choice)
4.8/5
(30)
Correct Answer:
D
It is predicted that ____ could become a key element in authentication in the future.
Free
(Multiple Choice)
4.9/5
(28)
Correct Answer:
A
____ accepts spoken words for input as if they had been typed on the keyboard.
Free
(Multiple Choice)
4.9/5
(41)
Correct Answer:
D
In most systems, a user logging in would be asked to ____________________ herself.
(Short Answer)
5.0/5
(41)
Microsoft is Windows ____ is a feature of Windows that is intended to provide users with control of their digital identities while helping them to manage privacy.
(Multiple Choice)
4.9/5
(33)
Match each term with the correct statement below.
Correct Answer:
Premises:
Responses:
(Matching)
4.8/5
(32)
To create a rainbow table, each ____ begins with an initial password that is encrypted.
(Multiple Choice)
5.0/5
(40)
____ is the time it takes for a key to be pressed and then released.
(Multiple Choice)
4.8/5
(40)
____ is related to the perception, thought process, and understanding of the user.
(Multiple Choice)
4.8/5
(27)
What are the three advantages of a rainbow table over other password attacks?
(Essay)
4.8/5
(28)
A token ____________________ is a unique random string of characters that is encrypted to protect the token from being used by unauthorized parties.
(Short Answer)
4.8/5
(40)
What are the three broad categories on which authentication can be based?
(Essay)
4.7/5
(36)
Today's operating systems have roots dating back 20 or more years, well before security was identified as a critical process.
(True/False)
4.8/5
(44)
Showing 1 - 20 of 42
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)