Exam 12: Authentication and Account Management
Exam 1: Introduction to Security50 Questions
Exam 2: Malware and Social Engineering Attacks50 Questions
Exam 3: Application and Networking-Based Attacks50 Questions
Exam 4: Host, Application, and Data Security50 Questions
Exam 5: Basic Cryptography50 Questions
Exam 6: Advanced Cryptography50 Questions
Exam 7: Network Security50 Questions
Exam 8: Administering a Secure Network50 Questions
Exam 9: Wireless Network Security50 Questions
Exam 10: Mobile Device Security50 Questions
Exam 11: Access Control Fundamentals50 Questions
Exam 12: Authentication and Account Management50 Questions
Exam 13: Business Continuity50 Questions
Exam 14: Risk Mitigation50 Questions
Exam 15: Vulnerability Assessment and Third Party Integration50 Questions
Select questions type
What type of attack involves using every possible combination of letters, numbers, and characters to create candidate digests that are then matched against those in a stolen digest file?
(Multiple Choice)
4.7/5
(35)
Which term below describes the time it takes for a key to be pressed and then released?
(Multiple Choice)
4.9/5
(31)
A token ____________________ is a unique random string of characters that is encrypted to protect the token from being used by unauthorized parties.
(Short Answer)
4.9/5
(33)
What federated identity management (FIM) relies on token credentials?
(Multiple Choice)
4.8/5
(36)
What technology allows users to share resources stored on one site with a second site without forwarding their authentication credentials to the other site?
(Multiple Choice)
4.7/5
(34)
What kind of biometrics utilizes a person's unique physical characteristics for authentication, such as fingerprints or unique characteristics of a person's face?
(Multiple Choice)
5.0/5
(46)
A(n) ____________________ attack begins with the attacker creating encrypted versions of common dictionary words, and then comparing them against those in a stolen password file.
(Short Answer)
4.8/5
(40)
What is the difference between multifactor authentication and single-factor authentication?
(Essay)
4.9/5
(36)
Which type of biometrics is based on the perception, thought process, and understanding of the user?
(Multiple Choice)
4.9/5
(39)
Showing 41 - 50 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)