Exam 10: Authentication and Account Management
Exam 1: Introduction to Security42 Questions
Exam 2: Malware and Social Engineering Attacks42 Questions
Exam 3: Application and Network Attacks42 Questions
Exam 4: Vulnerability Assessment and Mitigating Attacks42 Questions
Exam 5: Host, Application, and Data Security42 Questions
Exam 6: Network Security42 Questions
Exam 7: Administering a Secure Network42 Questions
Exam 8: Wireless Network Security42 Questions
Exam 9: Access Control Fundamentals42 Questions
Exam 10: Authentication and Account Management42 Questions
Exam 11: Basic Cryptography42 Questions
Exam 12: Advanced Cryptography42 Questions
Exam 13: Business Continuity42 Questions
Exam 14: Risk Mitigation42 Questions
Select questions type
____________________ is a decentralized open source FIM that does not require specific software to be installed on the desktop.
(Short Answer)
5.0/5
(30)
A(n) ____ can also capture transmissions that contain passwords.
(Multiple Choice)
4.9/5
(36)
Although brute force and dictionary attacks were once the primary tools used by attackers to crack an encrypted password, today attackers usually prefer ____.
(Multiple Choice)
4.8/5
(39)
____ holds the promise of reducing the number of usernames and passwords that users must memorize.
(Multiple Choice)
4.8/5
(36)
Due to the limitations of online guessing, most password attacks today use ____.
(Multiple Choice)
4.8/5
(38)
Trusted OSs have been used since the late 1960s, initially for government and military applications.
(True/False)
4.9/5
(26)
If a user typically accesses his bank's Web site from his home computer on nights and weekends, then this information can be used to establish a ____ of typical access.
(Multiple Choice)
4.9/5
(39)
A(n) ____________________ attack begins with the attacker creating encrypted versions of common dictionary words, and then comparing them against those in a stolen password file.
(Short Answer)
4.8/5
(32)
The most common type of authentication today is a(n) ____________________.
(Short Answer)
4.9/5
(32)
____ is using a single authentication credential that is shared across multiple networks.
(Multiple Choice)
4.8/5
(38)
A ____ is a secret combination of letters, numbers, and/or characters that only the user should know.
(Multiple Choice)
4.8/5
(35)
____ permits users to share resources stored on one site with a second site without forwarding their authentication credentials to the other site.
(Multiple Choice)
4.8/5
(24)
Discuss the types of shortcuts that users take to help them recall their passwords.
(Essay)
4.9/5
(40)
The set of letters, symbols, and characters that make up the password are known as a ____ set.
(Multiple Choice)
4.9/5
(38)
Token credentials can be revoked at any time by the user without affecting other token credentials issued to other sites.
(True/False)
4.8/5
(34)
____ can use fingerprints or other unique characteristics of a person's face, hands, or eyes (irises and retinas) to authenticate a user.
(Multiple Choice)
4.8/5
(30)
____ attack is where every possible combination of letters, numbers, and characters is used to create encrypted passwords.
(Multiple Choice)
4.9/5
(34)
Showing 21 - 40 of 42
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)