Exam 12: Authentication and Account Management

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

What variation of a dictionary attack involves a dictionary attack combined with a brute force attack, and will slightly alter dictionary words by adding numbers to the end of the password, spelling words backward, slightly misspelling words, or including special characters?

(Multiple Choice)
4.7/5
(30)

The most common type of authentication today is a(n) ____________________.

(Short Answer)
4.9/5
(32)

Matching -​A password attack that slightly alters dictionary words by adding numbers to the end of the password, spelling words backward, slightly misspelling words, or including special characters.

(Multiple Choice)
4.8/5
(32)

Matching -​A hash used by modern Microsoft Windows operating systems for creating password digests.

(Multiple Choice)
4.8/5
(36)

Explain why the LAN Manager (LM) hash is vulnerable.

(Essay)
4.8/5
(32)

Using a rainbow table to crack a password requires three steps: Creation of the table, comparing the table to known hash values, and decrypting the password.

(True/False)
4.8/5
(37)

____________________ is a decentralized open source FIM that does not require specific software to be installed on the desktop.

(Short Answer)
4.8/5
(34)

OpenID is an example of a web-based federated identity management (FIM) system.​

(True/False)
4.9/5
(29)

In most systems, a user logging in would be asked to ____________________ herself. ​

(Short Answer)
4.8/5
(32)

List and describe two of the common password setting objects.

(Essay)
4.7/5
(31)

Matching -Using one authentication credential to access multiple accounts or applications.​

(Multiple Choice)
4.8/5
(25)

Describe how rainbow tables work.

(Essay)
4.7/5
(30)

The use of one authentication credential to access multiple accounts or applications is referred to as?

(Multiple Choice)
4.9/5
(38)

​What type of one-time password (OTP) changes after a set time period?

(Multiple Choice)
4.9/5
(40)

Matching -A popular key stretching password hash algorithm​

(Multiple Choice)
4.8/5
(34)

A secret combination of letters, numbers, and/or characters that only the user should have knowledge of, is known as a:

(Multiple Choice)
4.7/5
(35)

What are the three advantages of a rainbow table over other password attacks?

(Essay)
4.9/5
(34)

What is the center of the weakness of passwords?

(Multiple Choice)
4.9/5
(36)

What are the three broad categories on which authentication can be based?

(Essay)
4.9/5
(36)

The use of what item below involves the creation of a large pregenerated data set of candidate digests?

(Multiple Choice)
4.8/5
(37)
Showing 21 - 40 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)