Deck 10: Authentication and Account Management
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Match between columns
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/42
Play
Full screen (f)
Deck 10: Authentication and Account Management
1
Due to the limitations of online guessing, most password attacks today use ____.
A) offline cracking
B) online cracking
C) hash replay
D) token replay
A) offline cracking
B) online cracking
C) hash replay
D) token replay
A
2
____ accepts spoken words for input as if they had been typed on the keyboard.
A) Text recognition
B) Speech differentiation
C) Linguistic recognition
D) Speech recognition
A) Text recognition
B) Speech differentiation
C) Linguistic recognition
D) Speech recognition
D
3
Token credentials can be revoked at any time by the user without affecting other token credentials issued to other sites.
True
4
A(n) ____ can also capture transmissions that contain passwords.
A) application analyzer
B) system analyzer
C) function analyzer
D) protocol analyzer
A) application analyzer
B) system analyzer
C) function analyzer
D) protocol analyzer
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
5
____ attack is where every possible combination of letters, numbers, and characters is used to create encrypted passwords.
A) Space division
B) Brute force
C) Known ciphertext
D) Known plaintext
A) Space division
B) Brute force
C) Known ciphertext
D) Known plaintext
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
6
The set of letters, symbols, and characters that make up the password are known as a ____ set.
A) result
B) problem
C) character
D) search
A) result
B) problem
C) character
D) search
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
7
Using a rainbow table to crack a password requires three steps.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
8
Trusted OSs have been used since the late 1960s, initially for government and military applications.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
9
If a user typically accesses his bank's Web site from his home computer on nights and weekends, then this information can be used to establish a ____ of typical access.
A) usage map
B) computer footprint
C) beachhead
D) system
A) usage map
B) computer footprint
C) beachhead
D) system
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
10
____ is the time it takes for a key to be pressed and then released.
A) Dwell time
B) Lead time
C) Sync time
D) Show time
A) Dwell time
B) Lead time
C) Sync time
D) Show time
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
11
To create a rainbow table, each ____ begins with an initial password that is encrypted.
A) link
B) chain
C) pass
D) block
A) link
B) chain
C) pass
D) block
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
12
____ is related to the perception, thought process, and understanding of the user.
A) Standard biometrics
B) Reactive biometrics
C) Cognitive biometrics
D) Affective biometrics
A) Standard biometrics
B) Reactive biometrics
C) Cognitive biometrics
D) Affective biometrics
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
13
The weakness of passwords centers on ____.
A) human memory
B) encryption technology
C) handshake technology
D) human reliability
A) human memory
B) encryption technology
C) handshake technology
D) human reliability
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
14
Although brute force and dictionary attacks were once the primary tools used by attackers to crack an encrypted password, today attackers usually prefer ____.
A) rainbow tables
B) online cracking
C) offline cracking
D) cascade tables
A) rainbow tables
B) online cracking
C) offline cracking
D) cascade tables
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
15
Passwords provide strong protection.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
16
It is predicted that ____ could become a key element in authentication in the future.
A) cognitive biometrics
B) standard biometrics
C) reactive biometrics
D) affective biometrics
A) cognitive biometrics
B) standard biometrics
C) reactive biometrics
D) affective biometrics
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
17
____ can use fingerprints or other unique characteristics of a person's face, hands, or eyes (irises and retinas) to authenticate a user.
A) Cognitive biometrics
B) Reactive biometrics
C) Standard biometrics
D) Affective biometrics
A) Cognitive biometrics
B) Reactive biometrics
C) Standard biometrics
D) Affective biometrics
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
18
Today's operating systems have roots dating back 20 or more years, well before security was identified as a critical process.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
19
A ____ is a secret combination of letters, numbers, and/or characters that only the user should know.
A) token
B) password
C) biometric detail
D) challenge
A) token
B) password
C) biometric detail
D) challenge
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
20
The ____ attack will slightly alter dictionary words by adding numbers to the end of the password, spelling words backward, slightly misspelling words, or including special characters such as @, $, !, or %.
A) brute force
B) hash replay
C) network replay
D) hybrid
A) brute force
B) hash replay
C) network replay
D) hybrid
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
21
Microsoft is Windows ____ is a feature of Windows that is intended to provide users with control of their digital identities while helping them to manage privacy.
A) CAPI
B) MAPI
C) CardSpace
D) CryptoAPI
A) CAPI
B) MAPI
C) CardSpace
D) CryptoAPI
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
22
____ is using a single authentication credential that is shared across multiple networks.
A) Access management
B) Authorization management
C) Identity management
D) Risk management
A) Access management
B) Authorization management
C) Identity management
D) Risk management
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
23
____ permits users to share resources stored on one site with a second site without forwarding their authentication credentials to the other site.
A) OpenAuth
B) OAuth
C) SAML
D) Kerberos
A) OpenAuth
B) OAuth
C) SAML
D) Kerberos
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
24
Explain how an attacker can use a resetting attack.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
25
A(n) ____________________ attack begins with the attacker creating encrypted versions of common dictionary words, and then comparing them against those in a stolen password file.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
26
What are the three broad categories on which authentication can be based?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
27
Describe how rainbow tables work.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
28
List and describe two of the common password setting objects.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
29
Discuss the types of shortcuts that users take to help them recall their passwords.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
30
A token ____________________ is a unique random string of characters that is encrypted to protect the token from being used by unauthorized parties.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
31
An operating system that has been reengineered so that it is designed to be secure from the ground up is known as a ____.
A) reference monitor
B) transaction monitor
C) system monitor
D) trusted OS
A) reference monitor
B) transaction monitor
C) system monitor
D) trusted OS
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
32
____ holds the promise of reducing the number of usernames and passwords that users must memorize.
A) ISO
B) SSO
C) SSL
D) IAM
A) ISO
B) SSO
C) SSL
D) IAM
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
33
The most common type of authentication today is a(n) ____________________.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
34
Windows Live ID was originally designed as a ____ system that would be used by a wide variety of Web servers.
A) federated identity management
B) liberated identity management
C) central identity management
D) distributed identity management
A) federated identity management
B) liberated identity management
C) central identity management
D) distributed identity management
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
35
____________________ is a decentralized open source FIM that does not require specific software to be installed on the desktop.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
36
In most systems, a user logging in would be asked to ____________________ herself.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
37
Why do passwords place a heavy load on human memory?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
38
What are the three advantages of a rainbow table over other password attacks?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
39
Discuss the weaknesses of OpenID.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
40
Identify two basic flows that operating systems can have.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
41
Discuss the focus of the OS vendors developing trusted OSs.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
42
Match between columns
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck