Exam 12: Authentication and Account Management

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

What type of attack involves using every possible combination of letters, numbers, and characters to create candidate digests that are then matched against those in a stolen digest file?

(Multiple Choice)
4.7/5
(35)

Which term below describes the time it takes for a key to be pressed and then released?

(Multiple Choice)
4.9/5
(31)

A token ____________________ is a unique random string of characters that is encrypted to protect the token from being used by unauthorized parties.

(Short Answer)
4.9/5
(33)

​What federated identity management (FIM) relies on token credentials?

(Multiple Choice)
4.8/5
(36)

What technology allows users to share resources stored on one site with a second site without forwarding their authentication credentials to the other site?

(Multiple Choice)
4.7/5
(34)

Passwords provide strong protection.

(True/False)
4.9/5
(35)

What kind of biometrics utilizes a person's unique physical characteristics for authentication, such as fingerprints or unique characteristics of a person's face?

(Multiple Choice)
5.0/5
(46)

A(n) ____________________ attack begins with the attacker creating encrypted versions of common dictionary words, and then comparing them against those in a stolen password file.

(Short Answer)
4.8/5
(40)

What is the difference between multifactor authentication and single-factor authentication?​

(Essay)
4.9/5
(36)

Which type of biometrics is based on the perception, thought process, and understanding of the user?

(Multiple Choice)
4.9/5
(39)
Showing 41 - 50 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)