Exam 11: Authentication and Account Management
Exam 1: Introduction to Security50 Questions
Exam 2: Malware and Social Engineering Attacks50 Questions
Exam 3: Basic Cryptography50 Questions
Exam 4: Advanced Cryptography and PKI50 Questions
Exam 5: Networking and Server Attacks50 Questions
Exam 6: Network Security Devices, Design, and Technology50 Questions
Exam 7: Administering a Secure Network50 Questions
Exam 8: Wireless Network Security50 Questions
Exam 9: Client and Application Security50 Questions
Exam 10: Mobile and Embedded Device Security50 Questions
Exam 11: Authentication and Account Management50 Questions
Exam 12: Access Management50 Questions
Exam 13: Vulnerability Assessment and Data Security50 Questions
Exam 14: Business Continuity50 Questions
Exam 15: Risk Mitigation50 Questions
Select questions type
What can be used to increase the strength of hashed passwords?
Free
(Multiple Choice)
4.7/5
(33)
Correct Answer:
A
Which of the following are key stretching password hash algorithms? (Choose all that apply. )
Free
(Multiple Choice)
4.9/5
(37)
Correct Answer:
A,B
Hash algorithms like MD5 and SHA are considered secure for creating digests because these hashing algorithms are designed to create a digest as strong as possible.
Free
(True/False)
4.9/5
(35)
Correct Answer:
False
Discuss the types of shortcuts that users take to help them recall their passwords.
(Essay)
4.8/5
(34)
What federation system technology uses federation standards to provide SSO and exchanging attributes?
(Multiple Choice)
4.8/5
(37)
What option below represents an example of behavioral biometrics?
(Multiple Choice)
4.7/5
(50)
What term best describes managing the login credentials such as passwords in user accounts?
(Multiple Choice)
4.8/5
(34)
What type of attack involves using every possible combination of letters,numbers,and characters to create candidate digests that are then matched against those in a stolen digest file?
(Multiple Choice)
4.8/5
(42)
Which type of biometrics is based on the perception,thought process,and understanding of the user?
(Multiple Choice)
4.9/5
(35)
Why should account passwords be disabled instead of the account being immediately deleted?
(Essay)
4.8/5
(31)
Which of the following account lockout policy settings determines the number of failed login attempts before a lockout occurs?
(Multiple Choice)
4.9/5
(37)
What variation of a dictionary attack involves a dictionary attack combined with a brute force attack,and will slightly alter dictionary words by adding numbers to the end of the password,spelling words backward,slightly misspelling words,or including special characters?
(Multiple Choice)
4.9/5
(36)
A hardware security token is typically a small device with a window display.
(True/False)
4.9/5
(32)
The use of what item below involves the creation of a large pre-generated data set of candidate digests?
(Multiple Choice)
4.8/5
(28)
Which of the following options prevents a logon after a set number of failed logon attempts within a specified period and can also specify the length of time that the lockout is in force?
(Multiple Choice)
4.8/5
(35)
Showing 1 - 20 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)