Exam 3: User Authentication

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A __________ strategy is one in which the system periodically runs its own password cracker to find guessable passwords.

Free
(Multiple Choice)
4.8/5
(29)
Correct Answer:
Verified

B

A __________ is when an adversary attempts to achieve user authentication without access to the remote host or to the intervening communications path.

Free
(Multiple Choice)
4.7/5
(33)
Correct Answer:
Verified

A

The __________ step is presenting or generating authentication information that corroborates the binding between the entity and the identifier.

Free
(Essay)
4.9/5
(37)
Correct Answer:
Verified

verification

__________ defines user authentication as "the process of verifying an identity claimed by or for a system entity".

(Multiple Choice)
4.9/5
(34)

The __________ is the pattern formed by veins beneath the retinal surface.

(Essay)
4.8/5
(27)

A __________ is a password guessing program.

(Multiple Choice)
4.9/5
(30)

A __________ is directed at the user file at the host where passwords,token passcodes,or biometric templates are stored.

(Multiple Choice)
4.7/5
(35)

With the __________ policy a user is allowed to select their own password,but the system checks to see if the password is allowable.

(Essay)
4.9/5
(38)

Identification is the means of establishing the validity of a claimed identity provided by a user.

(True/False)
4.7/5
(33)

Keylogging is a form of host attack.

(True/False)
4.7/5
(37)

A __________ attack attempts to disable a user authentication service by flooding the service with numerous authentication attempts.

(Essay)
4.9/5
(42)

Enrollment creates an association between a user and the user's biometric characteristics.

(True/False)
4.8/5
(34)

Depending on the details of the overall authentication system,the registration authority issues some sort of electronic credential to the subscriber.

(True/False)
4.9/5
(26)

User authentication is the fundamental building block and the primary line of defense.

(True/False)
4.8/5
(30)

Identifiers should be assigned carefully because authenticated identities are the basis for other security services.

(True/False)
4.7/5
(25)

To counter threats to remote user authentication,systems generally rely on some form of ___________ protocol.

(Multiple Choice)
4.8/5
(46)

In a biometric scheme some physical characteristic of the individual is mapped into a digital representation.

(True/False)
4.8/5
(39)

Each individual who is to be included in the database of authorized users must first be __________ in the system.

(Multiple Choice)
4.9/5
(39)

User authentication is a procedure that allows communicating parties to verify that the contents of a received message have not been altered and that the source is authentic.

(True/False)
4.8/5
(38)

The technique for developing an effective and efficient proactive password checker based on rejecting words on a list is based on the use of a __________ filter.

(Essay)
4.9/5
(42)
Showing 1 - 20 of 45
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)