Deck 10: Authentication and Account Management

Full screen (f)
exit full mode
Question
Due to the limitations of online guessing, most password attacks today use ____.

A) offline cracking
B) online cracking
C) hash replay
D) token replay
Use Space or
up arrow
down arrow
to flip the card.
Question
____ accepts spoken words for input as if they had been typed on the keyboard.

A) Text recognition
B) Speech differentiation
C) Linguistic recognition
D) Speech recognition
Question
Token credentials can be revoked at any time by the user without affecting other token credentials issued to other sites.
Question
A(n) ____ can also capture transmissions that contain passwords.

A) application analyzer
B) system analyzer
C) function analyzer
D) protocol analyzer
Question
____ attack is where every possible combination of letters, numbers, and characters is used to create encrypted passwords.

A) Space division
B) Brute force
C) Known ciphertext
D) Known plaintext
Question
The set of letters, symbols, and characters that make up the password are known as a ____ set.

A) result
B) problem
C) character
D) search
Question
Using a rainbow table to crack a password requires three steps.
Question
Trusted OSs have been used since the late 1960s, initially for government and military applications.
Question
If a user typically accesses his bank's Web site from his home computer on nights and weekends, then this information can be used to establish a ____ of typical access.

A) usage map
B) computer footprint
C) beachhead
D) system
Question
____ is the time it takes for a key to be pressed and then released.

A) Dwell time
B) Lead time
C) Sync time
D) Show time
Question
To create a rainbow table, each ____ begins with an initial password that is encrypted.

A) link
B) chain
C) pass
D) block
Question
____ is related to the perception, thought process, and understanding of the user.

A) Standard biometrics
B) Reactive biometrics
C) Cognitive biometrics
D) Affective biometrics
Question
The weakness of passwords centers on ____.

A) human memory
B) encryption technology
C) handshake technology
D) human reliability
Question
Although brute force and dictionary attacks were once the primary tools used by attackers to crack an encrypted password, today attackers usually prefer ____.

A) rainbow tables
B) online cracking
C) offline cracking
D) cascade tables
Question
Passwords provide strong protection.
Question
It is predicted that ____ could become a key element in authentication in the future.

A) cognitive biometrics
B) standard biometrics
C) reactive biometrics
D) affective biometrics
Question
____ can use fingerprints or other unique characteristics of a person's face, hands, or eyes (irises and retinas) to authenticate a user.

A) Cognitive biometrics
B) Reactive biometrics
C) Standard biometrics
D) Affective biometrics
Question
Today's operating systems have roots dating back 20 or more years, well before security was identified as a critical process.
Question
A ____ is a secret combination of letters, numbers, and/or characters that only the user should know.

A) token
B) password
C) biometric detail
D) challenge
Question
The ____ attack will slightly alter dictionary words by adding numbers to the end of the password, spelling words backward, slightly misspelling words, or including special characters such as @, $, !, or %.

A) brute force
B) hash replay
C) network replay
D) hybrid
Question
Microsoft is Windows ____ is a feature of Windows that is intended to provide users with control of their digital identities while helping them to manage privacy.

A) CAPI
B) MAPI
C) CardSpace
D) CryptoAPI
Question
____ is using a single authentication credential that is shared across multiple networks.

A) Access management
B) Authorization management
C) Identity management
D) Risk management
Question
____ permits users to share resources stored on one site with a second site without forwarding their authentication credentials to the other site.

A) OpenAuth
B) OAuth
C) SAML
D) Kerberos
Question
Explain how an attacker can use a resetting attack.
Question
A(n) ____________________ attack begins with the attacker creating encrypted versions of common dictionary words, and then comparing them against those in a stolen password file.
Question
What are the three broad categories on which authentication can be based?
Question
Describe how rainbow tables work.
Question
List and describe two of the common password setting objects.
Question
Discuss the types of shortcuts that users take to help them recall their passwords.
Question
A token ____________________ is a unique random string of characters that is encrypted to protect the token from being used by unauthorized parties.
Question
An operating system that has been reengineered so that it is designed to be secure from the ground up is known as a ____.

A) reference monitor
B) transaction monitor
C) system monitor
D) trusted OS
Question
____ holds the promise of reducing the number of usernames and passwords that users must memorize.

A) ISO
B) SSO
C) SSL
D) IAM
Question
The most common type of authentication today is a(n) ____________________.
Question
Windows Live ID was originally designed as a ____ system that would be used by a wide variety of Web servers.

A) federated identity management
B) liberated identity management
C) central identity management
D) distributed identity management
Question
____________________ is a decentralized open source FIM that does not require specific software to be installed on the desktop.
Question
In most systems, a user logging in would be asked to ____________________ herself.
Question
Why do passwords place a heavy load on human memory?
Question
What are the three advantages of a rainbow table over other password attacks?
Question
Discuss the weaknesses of OpenID.
Question
Identify two basic flows that operating systems can have.
Question
Discuss the focus of the OS vendors developing trusted OSs.
Question
Match between columns
A government standard for smart cards that covers all government employees
Standard biometrics
A government standard for smart cards that covers all government employees
Brute force
A government standard for smart cards that covers all government employees
Rainbow tables
A government standard for smart cards that covers all government employees
CAC
A government standard for smart cards that covers all government employees
PIV
A government standard for smart cards that covers all government employees
Token
A government standard for smart cards that covers all government employees
Behavioral biometrics
A government standard for smart cards that covers all government employees
Hybrid
A government standard for smart cards that covers all government employees
Account Lockout Policy
A Department of Defense (DoD) smart card used for identification for active-duty and reserve military personnel along with civilian employees and special contractors
Standard biometrics
A Department of Defense (DoD) smart card used for identification for active-duty and reserve military personnel along with civilian employees and special contractors
Brute force
A Department of Defense (DoD) smart card used for identification for active-duty and reserve military personnel along with civilian employees and special contractors
Rainbow tables
A Department of Defense (DoD) smart card used for identification for active-duty and reserve military personnel along with civilian employees and special contractors
CAC
A Department of Defense (DoD) smart card used for identification for active-duty and reserve military personnel along with civilian employees and special contractors
PIV
A Department of Defense (DoD) smart card used for identification for active-duty and reserve military personnel along with civilian employees and special contractors
Token
A Department of Defense (DoD) smart card used for identification for active-duty and reserve military personnel along with civilian employees and special contractors
Behavioral biometrics
A Department of Defense (DoD) smart card used for identification for active-duty and reserve military personnel along with civilian employees and special contractors
Hybrid
A Department of Defense (DoD) smart card used for identification for active-duty and reserve military personnel along with civilian employees and special contractors
Account Lockout Policy
A password attack in which every possible combination of letters, numbers, and characters is used to create encrypted passwords that are matched with those in a stolen password file
Standard biometrics
A password attack in which every possible combination of letters, numbers, and characters is used to create encrypted passwords that are matched with those in a stolen password file
Brute force
A password attack in which every possible combination of letters, numbers, and characters is used to create encrypted passwords that are matched with those in a stolen password file
Rainbow tables
A password attack in which every possible combination of letters, numbers, and characters is used to create encrypted passwords that are matched with those in a stolen password file
CAC
A password attack in which every possible combination of letters, numbers, and characters is used to create encrypted passwords that are matched with those in a stolen password file
PIV
A password attack in which every possible combination of letters, numbers, and characters is used to create encrypted passwords that are matched with those in a stolen password file
Token
A password attack in which every possible combination of letters, numbers, and characters is used to create encrypted passwords that are matched with those in a stolen password file
Behavioral biometrics
A password attack in which every possible combination of letters, numbers, and characters is used to create encrypted passwords that are matched with those in a stolen password file
Hybrid
A password attack in which every possible combination of letters, numbers, and characters is used to create encrypted passwords that are matched with those in a stolen password file
Account Lockout Policy
Prevents a logon after a set number of failed logon attempts within a specified period
Standard biometrics
Prevents a logon after a set number of failed logon attempts within a specified period
Brute force
Prevents a logon after a set number of failed logon attempts within a specified period
Rainbow tables
Prevents a logon after a set number of failed logon attempts within a specified period
CAC
Prevents a logon after a set number of failed logon attempts within a specified period
PIV
Prevents a logon after a set number of failed logon attempts within a specified period
Token
Prevents a logon after a set number of failed logon attempts within a specified period
Behavioral biometrics
Prevents a logon after a set number of failed logon attempts within a specified period
Hybrid
Prevents a logon after a set number of failed logon attempts within a specified period
Account Lockout Policy
Authenticating a user by the normal actions that the user performs
Standard biometrics
Authenticating a user by the normal actions that the user performs
Brute force
Authenticating a user by the normal actions that the user performs
Rainbow tables
Authenticating a user by the normal actions that the user performs
CAC
Authenticating a user by the normal actions that the user performs
PIV
Authenticating a user by the normal actions that the user performs
Token
Authenticating a user by the normal actions that the user performs
Behavioral biometrics
Authenticating a user by the normal actions that the user performs
Hybrid
Authenticating a user by the normal actions that the user performs
Account Lockout Policy
Make password attacks easier by creating a large pregenerated data set of encrypted passwords
Standard biometrics
Make password attacks easier by creating a large pregenerated data set of encrypted passwords
Brute force
Make password attacks easier by creating a large pregenerated data set of encrypted passwords
Rainbow tables
Make password attacks easier by creating a large pregenerated data set of encrypted passwords
CAC
Make password attacks easier by creating a large pregenerated data set of encrypted passwords
PIV
Make password attacks easier by creating a large pregenerated data set of encrypted passwords
Token
Make password attacks easier by creating a large pregenerated data set of encrypted passwords
Behavioral biometrics
Make password attacks easier by creating a large pregenerated data set of encrypted passwords
Hybrid
Make password attacks easier by creating a large pregenerated data set of encrypted passwords
Account Lockout Policy
A small device that can be affixed to a keychain with a window display that shows a code to be used for authentication
Standard biometrics
A small device that can be affixed to a keychain with a window display that shows a code to be used for authentication
Brute force
A small device that can be affixed to a keychain with a window display that shows a code to be used for authentication
Rainbow tables
A small device that can be affixed to a keychain with a window display that shows a code to be used for authentication
CAC
A small device that can be affixed to a keychain with a window display that shows a code to be used for authentication
PIV
A small device that can be affixed to a keychain with a window display that shows a code to be used for authentication
Token
A small device that can be affixed to a keychain with a window display that shows a code to be used for authentication
Behavioral biometrics
A small device that can be affixed to a keychain with a window display that shows a code to be used for authentication
Hybrid
A small device that can be affixed to a keychain with a window display that shows a code to be used for authentication
Account Lockout Policy
A password attack that slightly alters dictionary words by adding numbers to the end of the password, spelling words backward, slightly misspelling words, or including special characters
Standard biometrics
A password attack that slightly alters dictionary words by adding numbers to the end of the password, spelling words backward, slightly misspelling words, or including special characters
Brute force
A password attack that slightly alters dictionary words by adding numbers to the end of the password, spelling words backward, slightly misspelling words, or including special characters
Rainbow tables
A password attack that slightly alters dictionary words by adding numbers to the end of the password, spelling words backward, slightly misspelling words, or including special characters
CAC
A password attack that slightly alters dictionary words by adding numbers to the end of the password, spelling words backward, slightly misspelling words, or including special characters
PIV
A password attack that slightly alters dictionary words by adding numbers to the end of the password, spelling words backward, slightly misspelling words, or including special characters
Token
A password attack that slightly alters dictionary words by adding numbers to the end of the password, spelling words backward, slightly misspelling words, or including special characters
Behavioral biometrics
A password attack that slightly alters dictionary words by adding numbers to the end of the password, spelling words backward, slightly misspelling words, or including special characters
Hybrid
A password attack that slightly alters dictionary words by adding numbers to the end of the password, spelling words backward, slightly misspelling words, or including special characters
Account Lockout Policy
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/42
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 10: Authentication and Account Management
1
Due to the limitations of online guessing, most password attacks today use ____.

A) offline cracking
B) online cracking
C) hash replay
D) token replay
A
2
____ accepts spoken words for input as if they had been typed on the keyboard.

A) Text recognition
B) Speech differentiation
C) Linguistic recognition
D) Speech recognition
D
3
Token credentials can be revoked at any time by the user without affecting other token credentials issued to other sites.
True
4
A(n) ____ can also capture transmissions that contain passwords.

A) application analyzer
B) system analyzer
C) function analyzer
D) protocol analyzer
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
5
____ attack is where every possible combination of letters, numbers, and characters is used to create encrypted passwords.

A) Space division
B) Brute force
C) Known ciphertext
D) Known plaintext
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
6
The set of letters, symbols, and characters that make up the password are known as a ____ set.

A) result
B) problem
C) character
D) search
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
7
Using a rainbow table to crack a password requires three steps.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
8
Trusted OSs have been used since the late 1960s, initially for government and military applications.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
9
If a user typically accesses his bank's Web site from his home computer on nights and weekends, then this information can be used to establish a ____ of typical access.

A) usage map
B) computer footprint
C) beachhead
D) system
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
10
____ is the time it takes for a key to be pressed and then released.

A) Dwell time
B) Lead time
C) Sync time
D) Show time
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
11
To create a rainbow table, each ____ begins with an initial password that is encrypted.

A) link
B) chain
C) pass
D) block
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
12
____ is related to the perception, thought process, and understanding of the user.

A) Standard biometrics
B) Reactive biometrics
C) Cognitive biometrics
D) Affective biometrics
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
13
The weakness of passwords centers on ____.

A) human memory
B) encryption technology
C) handshake technology
D) human reliability
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
14
Although brute force and dictionary attacks were once the primary tools used by attackers to crack an encrypted password, today attackers usually prefer ____.

A) rainbow tables
B) online cracking
C) offline cracking
D) cascade tables
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
15
Passwords provide strong protection.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
16
It is predicted that ____ could become a key element in authentication in the future.

A) cognitive biometrics
B) standard biometrics
C) reactive biometrics
D) affective biometrics
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
17
____ can use fingerprints or other unique characteristics of a person's face, hands, or eyes (irises and retinas) to authenticate a user.

A) Cognitive biometrics
B) Reactive biometrics
C) Standard biometrics
D) Affective biometrics
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
18
Today's operating systems have roots dating back 20 or more years, well before security was identified as a critical process.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
19
A ____ is a secret combination of letters, numbers, and/or characters that only the user should know.

A) token
B) password
C) biometric detail
D) challenge
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
20
The ____ attack will slightly alter dictionary words by adding numbers to the end of the password, spelling words backward, slightly misspelling words, or including special characters such as @, $, !, or %.

A) brute force
B) hash replay
C) network replay
D) hybrid
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
21
Microsoft is Windows ____ is a feature of Windows that is intended to provide users with control of their digital identities while helping them to manage privacy.

A) CAPI
B) MAPI
C) CardSpace
D) CryptoAPI
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
22
____ is using a single authentication credential that is shared across multiple networks.

A) Access management
B) Authorization management
C) Identity management
D) Risk management
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
23
____ permits users to share resources stored on one site with a second site without forwarding their authentication credentials to the other site.

A) OpenAuth
B) OAuth
C) SAML
D) Kerberos
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
24
Explain how an attacker can use a resetting attack.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
25
A(n) ____________________ attack begins with the attacker creating encrypted versions of common dictionary words, and then comparing them against those in a stolen password file.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
26
What are the three broad categories on which authentication can be based?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
27
Describe how rainbow tables work.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
28
List and describe two of the common password setting objects.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
29
Discuss the types of shortcuts that users take to help them recall their passwords.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
30
A token ____________________ is a unique random string of characters that is encrypted to protect the token from being used by unauthorized parties.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
31
An operating system that has been reengineered so that it is designed to be secure from the ground up is known as a ____.

A) reference monitor
B) transaction monitor
C) system monitor
D) trusted OS
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
32
____ holds the promise of reducing the number of usernames and passwords that users must memorize.

A) ISO
B) SSO
C) SSL
D) IAM
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
33
The most common type of authentication today is a(n) ____________________.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
34
Windows Live ID was originally designed as a ____ system that would be used by a wide variety of Web servers.

A) federated identity management
B) liberated identity management
C) central identity management
D) distributed identity management
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
35
____________________ is a decentralized open source FIM that does not require specific software to be installed on the desktop.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
36
In most systems, a user logging in would be asked to ____________________ herself.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
37
Why do passwords place a heavy load on human memory?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
38
What are the three advantages of a rainbow table over other password attacks?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
39
Discuss the weaknesses of OpenID.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
40
Identify two basic flows that operating systems can have.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
41
Discuss the focus of the OS vendors developing trusted OSs.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
42
Match between columns
A government standard for smart cards that covers all government employees
Standard biometrics
A government standard for smart cards that covers all government employees
Brute force
A government standard for smart cards that covers all government employees
Rainbow tables
A government standard for smart cards that covers all government employees
CAC
A government standard for smart cards that covers all government employees
PIV
A government standard for smart cards that covers all government employees
Token
A government standard for smart cards that covers all government employees
Behavioral biometrics
A government standard for smart cards that covers all government employees
Hybrid
A government standard for smart cards that covers all government employees
Account Lockout Policy
A Department of Defense (DoD) smart card used for identification for active-duty and reserve military personnel along with civilian employees and special contractors
Standard biometrics
A Department of Defense (DoD) smart card used for identification for active-duty and reserve military personnel along with civilian employees and special contractors
Brute force
A Department of Defense (DoD) smart card used for identification for active-duty and reserve military personnel along with civilian employees and special contractors
Rainbow tables
A Department of Defense (DoD) smart card used for identification for active-duty and reserve military personnel along with civilian employees and special contractors
CAC
A Department of Defense (DoD) smart card used for identification for active-duty and reserve military personnel along with civilian employees and special contractors
PIV
A Department of Defense (DoD) smart card used for identification for active-duty and reserve military personnel along with civilian employees and special contractors
Token
A Department of Defense (DoD) smart card used for identification for active-duty and reserve military personnel along with civilian employees and special contractors
Behavioral biometrics
A Department of Defense (DoD) smart card used for identification for active-duty and reserve military personnel along with civilian employees and special contractors
Hybrid
A Department of Defense (DoD) smart card used for identification for active-duty and reserve military personnel along with civilian employees and special contractors
Account Lockout Policy
A password attack in which every possible combination of letters, numbers, and characters is used to create encrypted passwords that are matched with those in a stolen password file
Standard biometrics
A password attack in which every possible combination of letters, numbers, and characters is used to create encrypted passwords that are matched with those in a stolen password file
Brute force
A password attack in which every possible combination of letters, numbers, and characters is used to create encrypted passwords that are matched with those in a stolen password file
Rainbow tables
A password attack in which every possible combination of letters, numbers, and characters is used to create encrypted passwords that are matched with those in a stolen password file
CAC
A password attack in which every possible combination of letters, numbers, and characters is used to create encrypted passwords that are matched with those in a stolen password file
PIV
A password attack in which every possible combination of letters, numbers, and characters is used to create encrypted passwords that are matched with those in a stolen password file
Token
A password attack in which every possible combination of letters, numbers, and characters is used to create encrypted passwords that are matched with those in a stolen password file
Behavioral biometrics
A password attack in which every possible combination of letters, numbers, and characters is used to create encrypted passwords that are matched with those in a stolen password file
Hybrid
A password attack in which every possible combination of letters, numbers, and characters is used to create encrypted passwords that are matched with those in a stolen password file
Account Lockout Policy
Prevents a logon after a set number of failed logon attempts within a specified period
Standard biometrics
Prevents a logon after a set number of failed logon attempts within a specified period
Brute force
Prevents a logon after a set number of failed logon attempts within a specified period
Rainbow tables
Prevents a logon after a set number of failed logon attempts within a specified period
CAC
Prevents a logon after a set number of failed logon attempts within a specified period
PIV
Prevents a logon after a set number of failed logon attempts within a specified period
Token
Prevents a logon after a set number of failed logon attempts within a specified period
Behavioral biometrics
Prevents a logon after a set number of failed logon attempts within a specified period
Hybrid
Prevents a logon after a set number of failed logon attempts within a specified period
Account Lockout Policy
Authenticating a user by the normal actions that the user performs
Standard biometrics
Authenticating a user by the normal actions that the user performs
Brute force
Authenticating a user by the normal actions that the user performs
Rainbow tables
Authenticating a user by the normal actions that the user performs
CAC
Authenticating a user by the normal actions that the user performs
PIV
Authenticating a user by the normal actions that the user performs
Token
Authenticating a user by the normal actions that the user performs
Behavioral biometrics
Authenticating a user by the normal actions that the user performs
Hybrid
Authenticating a user by the normal actions that the user performs
Account Lockout Policy
Make password attacks easier by creating a large pregenerated data set of encrypted passwords
Standard biometrics
Make password attacks easier by creating a large pregenerated data set of encrypted passwords
Brute force
Make password attacks easier by creating a large pregenerated data set of encrypted passwords
Rainbow tables
Make password attacks easier by creating a large pregenerated data set of encrypted passwords
CAC
Make password attacks easier by creating a large pregenerated data set of encrypted passwords
PIV
Make password attacks easier by creating a large pregenerated data set of encrypted passwords
Token
Make password attacks easier by creating a large pregenerated data set of encrypted passwords
Behavioral biometrics
Make password attacks easier by creating a large pregenerated data set of encrypted passwords
Hybrid
Make password attacks easier by creating a large pregenerated data set of encrypted passwords
Account Lockout Policy
A small device that can be affixed to a keychain with a window display that shows a code to be used for authentication
Standard biometrics
A small device that can be affixed to a keychain with a window display that shows a code to be used for authentication
Brute force
A small device that can be affixed to a keychain with a window display that shows a code to be used for authentication
Rainbow tables
A small device that can be affixed to a keychain with a window display that shows a code to be used for authentication
CAC
A small device that can be affixed to a keychain with a window display that shows a code to be used for authentication
PIV
A small device that can be affixed to a keychain with a window display that shows a code to be used for authentication
Token
A small device that can be affixed to a keychain with a window display that shows a code to be used for authentication
Behavioral biometrics
A small device that can be affixed to a keychain with a window display that shows a code to be used for authentication
Hybrid
A small device that can be affixed to a keychain with a window display that shows a code to be used for authentication
Account Lockout Policy
A password attack that slightly alters dictionary words by adding numbers to the end of the password, spelling words backward, slightly misspelling words, or including special characters
Standard biometrics
A password attack that slightly alters dictionary words by adding numbers to the end of the password, spelling words backward, slightly misspelling words, or including special characters
Brute force
A password attack that slightly alters dictionary words by adding numbers to the end of the password, spelling words backward, slightly misspelling words, or including special characters
Rainbow tables
A password attack that slightly alters dictionary words by adding numbers to the end of the password, spelling words backward, slightly misspelling words, or including special characters
CAC
A password attack that slightly alters dictionary words by adding numbers to the end of the password, spelling words backward, slightly misspelling words, or including special characters
PIV
A password attack that slightly alters dictionary words by adding numbers to the end of the password, spelling words backward, slightly misspelling words, or including special characters
Token
A password attack that slightly alters dictionary words by adding numbers to the end of the password, spelling words backward, slightly misspelling words, or including special characters
Behavioral biometrics
A password attack that slightly alters dictionary words by adding numbers to the end of the password, spelling words backward, slightly misspelling words, or including special characters
Hybrid
A password attack that slightly alters dictionary words by adding numbers to the end of the password, spelling words backward, slightly misspelling words, or including special characters
Account Lockout Policy
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 42 flashcards in this deck.