Exam 11: Authentication and Account Management

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

What can be used to increase the strength of hashed passwords?

Free
(Multiple Choice)
4.7/5
(33)
Correct Answer:
Verified

A

Which of the following are key stretching password hash algorithms? (Choose all that apply. )

Free
(Multiple Choice)
4.9/5
(37)
Correct Answer:
Verified

A,B

Hash algorithms like MD5 and SHA are considered secure for creating digests because these hashing algorithms are designed to create a digest as strong as possible.

Free
(True/False)
4.9/5
(35)
Correct Answer:
Verified

False

Discuss the types of shortcuts that users take to help them recall their passwords.

(Essay)
4.8/5
(34)

What federation system technology uses federation standards to provide SSO and exchanging attributes?

(Multiple Choice)
4.8/5
(37)

Keystroke dynamics uses two unique typing variables.

(True/False)
4.9/5
(29)

What option below represents an example of behavioral biometrics?

(Multiple Choice)
4.7/5
(50)

What term best describes managing the login credentials such as passwords in user accounts?

(Multiple Choice)
4.8/5
(34)

What type of attack involves using every possible combination of letters,numbers,and characters to create candidate digests that are then matched against those in a stolen digest file?

(Multiple Choice)
4.8/5
(42)

Which type of biometrics is based on the perception,thought process,and understanding of the user?

(Multiple Choice)
4.9/5
(35)

Most password attacks today are an offline attack.

(True/False)
4.9/5
(33)

Why should account passwords be disabled instead of the account being immediately deleted?

(Essay)
4.8/5
(31)

Which of the following account lockout policy settings determines the number of failed login attempts before a lockout occurs?

(Multiple Choice)
4.9/5
(37)

What variation of a dictionary attack involves a dictionary attack combined with a brute force attack,and will slightly alter dictionary words by adding numbers to the end of the password,spelling words backward,slightly misspelling words,or including special characters?

(Multiple Choice)
4.9/5
(36)

Passwords provide strong protection.

(True/False)
4.9/5
(31)

What type of authentication is based on what the user has?

(Multiple Choice)
4.8/5
(33)

A hardware security token is typically a small device with a window display.

(True/False)
4.9/5
(32)

The use of what item below involves the creation of a large pre-generated data set of candidate digests?

(Multiple Choice)
4.8/5
(28)

Describe how rainbow tables work.

(Essay)
4.7/5
(36)

Which of the following options prevents a logon after a set number of failed logon attempts within a specified period and can also specify the length of time that the lockout is in force?

(Multiple Choice)
4.8/5
(35)
Showing 1 - 20 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)