Exam 12: Authentication and Account Management
Exam 1: Introduction to Security50 Questions
Exam 2: Malware and Social Engineering Attacks50 Questions
Exam 3: Application and Networking-Based Attacks50 Questions
Exam 4: Host, Application, and Data Security50 Questions
Exam 5: Basic Cryptography50 Questions
Exam 6: Advanced Cryptography50 Questions
Exam 7: Network Security50 Questions
Exam 8: Administering a Secure Network50 Questions
Exam 9: Wireless Network Security50 Questions
Exam 10: Mobile Device Security50 Questions
Exam 11: Access Control Fundamentals50 Questions
Exam 12: Authentication and Account Management50 Questions
Exam 13: Business Continuity50 Questions
Exam 14: Risk Mitigation50 Questions
Exam 15: Vulnerability Assessment and Third Party Integration50 Questions
Select questions type
Passwords that are transmitted can be captured by what type of software?
Free
(Multiple Choice)
4.9/5
(36)
Correct Answer:
D
Matching
-A random string that is used in hash algorithms.
Free
(Multiple Choice)
4.9/5
(37)
Correct Answer:
H
Matching
-A password hashing algorithm that requires significantly more time than standard hashing algorithms to create the digest.
Free
(Multiple Choice)
4.9/5
(35)
Correct Answer:
F
Discuss the types of shortcuts that users take to help them recall their passwords.
(Essay)
4.8/5
(35)
Matching
-Five elements that can prove the genuineness of a user: what you know, what you have, what you are, what you do, and where you are.
(Multiple Choice)
4.8/5
(43)
Which hashing algorithm below is used with NTLMv2's Hashed Message Authentication Code?
(Multiple Choice)
4.7/5
(37)
A U.S. Department of Defense (DoD) smart card that is used for identification of active-duty and reserve military personnel along with civilian employees and special contractors is called:
(Multiple Choice)
4.8/5
(34)
Matching
-A small device that can be affixed to a keychain with a window display that shows a code to be used for authentication.
(Multiple Choice)
4.8/5
(32)
Matching
-A password attack in which every possible combination of letters, numbers, and characters is used to create encrypted passwords that are matched against those in a stolen password file.
(Multiple Choice)
4.8/5
(35)
Matching
-A password attack that creates encrypted versions of common dictionary words and compares them against those in a stolen password file.
(Multiple Choice)
4.8/5
(28)
Geolocation is the identification of the location of a person or object using technology, and can be used as part of an authentication method.
(True/False)
4.8/5
(33)
Token credentials can be revoked at any time by the user without affecting other token credentials issued to other sites.
(True/False)
4.8/5
(39)
A list of the available nonkeyboard characters can be seen in Windows by opening what utility?
(Multiple Choice)
4.8/5
(36)
The use of a single authentication credential that is shared across multiple networks is called:
(Multiple Choice)
4.8/5
(28)
What can be used to increase the strength of hashed passwords?
(Multiple Choice)
4.8/5
(32)
What type of attack involves an attacker stealing a file containing password digests and comparing the digests with digests created by the attacker?
(Multiple Choice)
4.9/5
(32)
Select below the decentralized open-source FIM that does not require specific software to be installed on the desktop:
(Multiple Choice)
4.8/5
(32)
Showing 1 - 20 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)