Exam 3: User Authentication

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

__________ systems identify features of the hand,including shape,and lengths and widths of fingers.

(Multiple Choice)
4.9/5
(33)

An authentication process consists of the _________ step and the verification step.

(Short Answer)
4.7/5
(37)

A __________ is when an adversary attempts to achieve user authentication without access to the remote host or to the intervening communications path.

(Multiple Choice)
4.9/5
(35)

A good technique for choosing a password is to use the first letter of each word of a phrase.

(True/False)
4.7/5
(38)

The __________ is the pattern formed by veins beneath the retinal surface.

(Short Answer)
5.0/5
(39)

A __________ is an individual to whom a debit card is issued.

(Short Answer)
4.9/5
(32)

An individual's signature is not unique enough to use in biometric applications.

(True/False)
4.9/5
(33)

Memory cards store and process data.

(True/False)
4.9/5
(34)

User authentication is the basis for most types of access control and for user accountability.

(True/False)
4.7/5
(40)

Enrollment creates an association between a user and the user's biometric characteristics.

(True/False)
4.9/5
(36)

A host generated random number is often called a __________.

(Short Answer)
4.9/5
(32)

Each individual who is to be included in the database of authorized users must first be __________ in the system.

(Multiple Choice)
4.9/5
(26)

__________,in the context of passwords,refers to an adversary's attempt to learn the password by observing the user,finding a written copy of the password,or some similar attack that involves the physical proximity of user and adversary.

(Short Answer)
4.9/5
(42)

__________ defines user authentication as "the process of verifying an identity claimed by or for a system entity".

(Multiple Choice)
4.8/5
(41)

Depending on the application,user authentication on a biometric system involves either verification or identification.

(True/False)
4.8/5
(27)

An institution that issues debit cards to cardholders and is responsible for the cardholder's account and authorizing transactions is the _________.

(Multiple Choice)
4.9/5
(39)

In a biometric scheme some physical characteristic of the individual is mapped into a digital representation.

(True/False)
4.8/5
(39)

A __________ strategy is one in which the system periodically runs its own password cracker to find guessable passwords.

(Multiple Choice)
5.0/5
(45)

In a __________ attack,an application or physical device masquerades as an authentic application or device for the purpose of capturing a user password,passcode,or biometric.

(Short Answer)
4.9/5
(30)

Identifiers should be assigned carefully because authenticated identities are the basis for other security services.

(True/False)
4.7/5
(30)
Showing 21 - 40 of 44
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)