Exam 12: Authentication and Account Management

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Passwords that are transmitted can be captured by what type of software?

Free
(Multiple Choice)
4.9/5
(36)
Correct Answer:
Verified

D

Matching -​A random string that is used in hash algorithms.

Free
(Multiple Choice)
4.9/5
(37)
Correct Answer:
Verified

H

Matching -A password hashing algorithm that requires significantly more time than standard hashing algorithms to create the digest.​

Free
(Multiple Choice)
4.9/5
(35)
Correct Answer:
Verified

F

Discuss the types of shortcuts that users take to help them recall their passwords.

(Essay)
4.8/5
(35)

Matching -​Five elements that can prove the genuineness of a user: what you know, what you have, what you are, what you do, and where you are.

(Multiple Choice)
4.8/5
(43)

Discuss the weaknesses of OpenID.

(Essay)
4.8/5
(28)

​Which hashing algorithm below is used with NTLMv2's Hashed Message Authentication Code?

(Multiple Choice)
4.7/5
(37)

​A U.S. Department of Defense (DoD) smart card that is used for identification of active-duty and reserve military personnel along with civilian employees and special contractors is called:

(Multiple Choice)
4.8/5
(34)

Matching -​A small device that can be affixed to a keychain with a window display that shows a code to be used for authentication.

(Multiple Choice)
4.8/5
(32)

Matching -A password attack in which every possible combination of letters, numbers, and characters is used to create encrypted passwords that are matched against those in a stolen password file.​

(Multiple Choice)
4.8/5
(35)

Why do passwords place a heavy load on human memory?

(Essay)
4.8/5
(23)

Explain how an attacker can use a resetting attack.

(Essay)
4.7/5
(28)

Matching -A password attack that creates encrypted versions of common dictionary words and compares them against those in a stolen password file.​

(Multiple Choice)
4.8/5
(28)

Geolocation is the identification of the location of a person or object using technology, and can be used as part of an authentication method.​

(True/False)
4.8/5
(33)

Token credentials can be revoked at any time by the user without affecting other token credentials issued to other sites.

(True/False)
4.8/5
(39)

​A list of the available nonkeyboard characters can be seen in Windows by opening what utility?

(Multiple Choice)
4.8/5
(36)

The use of a single authentication credential that is shared across multiple networks is called:

(Multiple Choice)
4.8/5
(28)

What can be used to increase the strength of hashed passwords?​

(Multiple Choice)
4.8/5
(32)

What type of attack involves an attacker stealing a file containing password digests and comparing the digests with digests created by the attacker?

(Multiple Choice)
4.9/5
(32)

​Select below the decentralized open-source FIM that does not require specific software to be installed on the desktop:

(Multiple Choice)
4.8/5
(32)
Showing 1 - 20 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)