Exam 3: User Authentication

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The most common means of human-to-human identification are __________.

Free
(Multiple Choice)
4.9/5
(35)
Correct Answer:
Verified

A

Presenting or generating authentication information that corroborates the binding between the entity and the identifier is the ___________.

Free
(Multiple Choice)
4.8/5
(34)
Correct Answer:
Verified

C

Voice pattern,handwriting characteristics,and typing rhythm are examples of __________ biometrics.

Free
(Short Answer)
4.7/5
(44)
Correct Answer:
Verified

dynamic

A __________ is a separate file from the user IDs where hashed passwords are kept.

(Short Answer)
5.0/5
(35)

Authentication protocols used with smart tokens can be classified into three categories: static,dynamic password generator,and ___________.

(Short Answer)
4.8/5
(36)

With the __________ strategy a user is allowed to select their own password,but the system checks to see if the password is allowable.

(Short Answer)
4.9/5
(30)

A smart card contains an entire microprocessor.

(True/False)
4.8/5
(37)

The __________ step is presenting or generating authentication information that corroborates the binding between the entity and the identifier.

(Short Answer)
4.7/5
(23)

A __________ is directed at the user file at the host where passwords,token passcodes,or biometric templates are stored.

(Multiple Choice)
4.9/5
(32)

User authentication is a procedure that allows communicating parties to verify that the contents of a received message have not been altered and that the source is authentic.

(True/False)
4.7/5
(42)

The __________ strategy is when users are told the importance of using hard to guess passwords and provided with guidelines for selecting strong passwords.

(Multiple Choice)
4.8/5
(37)

__________ allows an issuer to access regional and national networks that connect point of sale devices and bank teller machines worldwide.

(Multiple Choice)
4.9/5
(30)

A __________ attack attempts to disable a user authentication service by flooding the service with numerous authentication attempts.

(Short Answer)
4.9/5
(32)

Objects that a user possesses for the purpose of user authentication are called ______.

(Short Answer)
4.9/5
(34)

Recognition by fingerprint,retina,and face are examples of __________.

(Multiple Choice)
4.8/5
(34)

To counter threats to remote user authentication,systems generally rely on some form of ___________ protocol.

(Multiple Choice)
4.7/5
(37)

A __________ authentication system attempts to authenticate an individual based on his or her unique physical characteristics.

(Short Answer)
4.8/5
(28)

A __________ is a password guessing program.

(Multiple Choice)
4.8/5
(37)

User authentication is the fundamental building block and the primary line of defense.

(True/False)
4.7/5
(33)

The technique for developing an effective and efficient proactive password checker based on rejecting words on a list is based on the use of a __________ filter.

(Short Answer)
4.9/5
(34)
Showing 1 - 20 of 44
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)