Exam 3: User Authentication

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The technique for developing an effective and efficient proactive password checker based on rejecting words on a list is based on the use of a __________ filter.

Free
(Short Answer)
4.9/5
(40)
Correct Answer:
Verified

Bloom

User authentication is the fundamental building block and the primaryline of defense.

Free
(True/False)
4.9/5
(41)
Correct Answer:
Verified

True

A __________ is a password guessing program.

Free
(Multiple Choice)
4.8/5
(41)
Correct Answer:
Verified

B

Each individual who is to be included in the database of authorized users must first be __________ in the system.

(Multiple Choice)
4.8/5
(38)

__________ defines user authentication as "the process of verifying an identity claimed by or for a system entity".

(Multiple Choice)
4.8/5
(44)

A __________ is directed at the user file at the host where passwords, token passcodes, or biometric templates are stored.

(Multiple Choice)
4.9/5
(32)

A __________ attack involves an adversary repeating a previously captured user response.

(Multiple Choice)
4.8/5
(31)

An institution that issues debit cards to cardholders and is responsible for the cardholder's account and authorizing transactions is the _________.

(Multiple Choice)
5.0/5
(37)

Identification is the means of establishing the validity of a claimedidentity provided by a user.

(True/False)
4.8/5
(39)

Identifiers should be assigned carefully because authenticatedidentities are the basis for other security services.

(True/False)
4.7/5
(39)

A __________ strategy is one in which the system periodically runs its own password cracker to find guessable passwords.

(Multiple Choice)
4.8/5
(38)

Voice pattern, handwriting characteristics, and typing rhythm are examples of __________ biometrics.

(Short Answer)
4.8/5
(37)

Enrollment creates an association between a user and the user'sbiometric characteristics.

(True/False)
5.0/5
(32)

A __________ is a separate file from the user IDs where hashed passwords are kept.

(Short Answer)
4.8/5
(32)

A smart card contains an entire microprocessor.

(True/False)
4.8/5
(29)

In a __________ attack, an application or physical device masquerades as an authentic application or device for the purpose of capturing a user password, passcode, or biometric.

(Short Answer)
4.8/5
(40)

An authentication process consists of the _________ step and the verification step.

(Short Answer)
4.9/5
(32)

User authentication is a procedure that allows communicating parties toverify that the contents of a received message have not been altered and that the source is authentic.

(True/False)
4.8/5
(38)

Memory cards store and process data.

(True/False)
4.8/5
(36)

User authentication is the basis for most types of access control and foruser accountability.

(True/False)
4.8/5
(35)
Showing 1 - 20 of 45
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)