Exam 10: Authentication and Account Management

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

____________________ is a decentralized open source FIM that does not require specific software to be installed on the desktop.

(Short Answer)
5.0/5
(30)

A(n) ____ can also capture transmissions that contain passwords.

(Multiple Choice)
4.9/5
(36)

Although brute force and dictionary attacks were once the primary tools used by attackers to crack an encrypted password, today attackers usually prefer ____.

(Multiple Choice)
4.8/5
(39)

____ holds the promise of reducing the number of usernames and passwords that users must memorize.

(Multiple Choice)
4.8/5
(36)

Due to the limitations of online guessing, most password attacks today use ____.

(Multiple Choice)
4.8/5
(38)

Trusted OSs have been used since the late 1960s, initially for government and military applications.

(True/False)
4.9/5
(26)

If a user typically accesses his bank's Web site from his home computer on nights and weekends, then this information can be used to establish a ____ of typical access.

(Multiple Choice)
4.9/5
(39)

A(n) ____________________ attack begins with the attacker creating encrypted versions of common dictionary words, and then comparing them against those in a stolen password file.

(Short Answer)
4.8/5
(32)

The most common type of authentication today is a(n) ____________________.

(Short Answer)
4.9/5
(32)

____ is using a single authentication credential that is shared across multiple networks.

(Multiple Choice)
4.8/5
(38)

The weakness of passwords centers on ____.

(Multiple Choice)
4.9/5
(46)

A ____ is a secret combination of letters, numbers, and/or characters that only the user should know.

(Multiple Choice)
4.8/5
(35)

____ permits users to share resources stored on one site with a second site without forwarding their authentication credentials to the other site.

(Multiple Choice)
4.8/5
(24)

Discuss the weaknesses of OpenID.

(Essay)
4.8/5
(32)

Discuss the types of shortcuts that users take to help them recall their passwords.

(Essay)
4.9/5
(40)

The set of letters, symbols, and characters that make up the password are known as a ____ set.

(Multiple Choice)
4.9/5
(38)

Token credentials can be revoked at any time by the user without affecting other token credentials issued to other sites.

(True/False)
4.8/5
(34)

____ can use fingerprints or other unique characteristics of a person's face, hands, or eyes (irises and retinas) to authenticate a user.

(Multiple Choice)
4.8/5
(30)

Why do passwords place a heavy load on human memory?

(Essay)
4.9/5
(35)

____ attack is where every possible combination of letters, numbers, and characters is used to create encrypted passwords.

(Multiple Choice)
4.9/5
(34)
Showing 21 - 40 of 42
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)