Exam 11: Authentication and Account Management

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

What kind of biometrics utilizes a person's unique physical characteristics for authentication,such as fingerprints or unique characteristics of a person's face?

(Multiple Choice)
4.8/5
(32)

Which of the following is NOT a valid biometric disadvantage?

(Multiple Choice)
4.8/5
(33)

What technology is an open source federation framework and supports the development of authorization protocols?

(Multiple Choice)
4.9/5
(36)

How does an iris scanner work?

(Essay)
4.9/5
(31)

Which of the following is a category of group password settings in Microsoft Windows? (Choose all that apply. )

(Multiple Choice)
4.8/5
(47)

A list of the available nonkeyboard characters can be seen in Windows by opening what utility?

(Multiple Choice)
4.8/5
(29)

A secret combination of letters,numbers,and/or characters that only the user should have knowledge of,is known as a:

(Multiple Choice)
4.8/5
(30)

What are the three advantages of a rainbow table over other password attacks?

(Essay)
4.8/5
(39)

A TOTP changes after a set period.

(True/False)
4.9/5
(37)

Which of the following is a is a two-way relationship that is automatically created between parent and child domains in a Microsoft Active Directory forest?

(Multiple Choice)
4.9/5
(24)

Brute force attacks can be very slow because every character combination must be generated.

(True/False)
4.8/5
(36)

What type of card contains an integrated circuit chip that can hold information,which then can be used as part of the authentication process?

(Multiple Choice)
4.9/5
(36)

What type of attack conducts a statistical analysis of the stolen passwords that is then used to create a mask to break the largest number of passwords?

(Multiple Choice)
4.7/5
(25)

Which of the following accounts is a user account that is created explicitly to provide a security context for services running on a server?

(Multiple Choice)
4.8/5
(37)

Which term below describes the time it takes for a key to be pressed and then released?

(Multiple Choice)
4.8/5
(29)

The use of one authentication credential to access multiple accounts or applications is referred to as which of the following?

(Multiple Choice)
4.9/5
(36)

Open ID Connect is an Authentication protocol that can be used in OAuth 2.0 as a standard means to obtain user identity.

(True/False)
4.8/5
(38)

What specific type of authentication can be based on where the user is located?

(Multiple Choice)
4.8/5
(41)

A retina scanner has become the most common type of standard biometrics.

(True/False)
4.9/5
(32)

Why do passwords place a heavy load on human memory?

(Essay)
4.9/5
(38)
Showing 21 - 40 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)