Exam 12: Authentication and Account Management
Exam 1: Introduction to Security50 Questions
Exam 2: Malware and Social Engineering Attacks50 Questions
Exam 3: Application and Networking-Based Attacks50 Questions
Exam 4: Host, Application, and Data Security50 Questions
Exam 5: Basic Cryptography50 Questions
Exam 6: Advanced Cryptography50 Questions
Exam 7: Network Security50 Questions
Exam 8: Administering a Secure Network50 Questions
Exam 9: Wireless Network Security50 Questions
Exam 10: Mobile Device Security50 Questions
Exam 11: Access Control Fundamentals50 Questions
Exam 12: Authentication and Account Management50 Questions
Exam 13: Business Continuity50 Questions
Exam 14: Risk Mitigation50 Questions
Exam 15: Vulnerability Assessment and Third Party Integration50 Questions
Select questions type
What variation of a dictionary attack involves a dictionary attack combined with a brute force attack, and will slightly alter dictionary words by adding numbers to the end of the password, spelling words backward, slightly misspelling words, or including special characters?
(Multiple Choice)
4.7/5
(30)
The most common type of authentication today is a(n) ____________________.
(Short Answer)
4.9/5
(32)
Matching
-A password attack that slightly alters dictionary words by adding numbers to the end of the password, spelling words backward, slightly misspelling words, or including special characters.
(Multiple Choice)
4.8/5
(32)
Matching
-A hash used by modern Microsoft Windows operating systems for creating password digests.
(Multiple Choice)
4.8/5
(36)
Using a rainbow table to crack a password requires three steps: Creation of the table, comparing the table to known hash values, and decrypting the password.
(True/False)
4.8/5
(37)
____________________ is a decentralized open source FIM that does not require specific software to be installed on the desktop.
(Short Answer)
4.8/5
(34)
OpenID is an example of a web-based federated identity management (FIM) system.
(True/False)
4.9/5
(29)
In most systems, a user logging in would be asked to ____________________ herself.
(Short Answer)
4.8/5
(32)
Matching
-Using one authentication credential to access multiple accounts or applications.
(Multiple Choice)
4.8/5
(25)
The use of one authentication credential to access multiple accounts or applications is referred to as?
(Multiple Choice)
4.9/5
(38)
What type of one-time password (OTP) changes after a set time period?
(Multiple Choice)
4.9/5
(40)
Matching
-A popular key stretching password hash algorithm
(Multiple Choice)
4.8/5
(34)
A secret combination of letters, numbers, and/or characters that only the user should have knowledge of, is known as a:
(Multiple Choice)
4.7/5
(35)
What are the three advantages of a rainbow table over other password attacks?
(Essay)
4.9/5
(34)
What are the three broad categories on which authentication can be based?
(Essay)
4.9/5
(36)
The use of what item below involves the creation of a large pregenerated data set of candidate digests?
(Multiple Choice)
4.8/5
(37)
Showing 21 - 40 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)