Deck 11: Authentication and Account Management

Full screen (f)
exit full mode
Question
The use of one authentication credential to access multiple accounts or applications is referred to as which of the following?

A)individual Sign On
B)single Sign On
C)unilateral Sign On
D)federated Sign On
Use Space or
up arrow
down arrow
to flip the card.
Question
Which term below describes the time it takes for a key to be pressed and then released?

A)dwell time
B)lead time
C)sync time
D)react time
Question
A retina scanner has become the most common type of standard biometrics.
Question
Passwords provide strong protection.
Question
What variation of a dictionary attack involves a dictionary attack combined with a brute force attack,and will slightly alter dictionary words by adding numbers to the end of the password,spelling words backward,slightly misspelling words,or including special characters?

A)brute force
B)hash replay
C)network replay
D)hybrid
Question
A hardware security token is typically a small device with a window display.
Question
Brute force attacks can be very slow because every character combination must be generated.
Question
Voice recognition is identical to speech recognition.
Question
What kind of biometrics utilizes a person's unique physical characteristics for authentication,such as fingerprints or unique characteristics of a person's face?

A)cognitive biometrics
B)reactive biometrics
C)standard biometrics
D)physical biometrics
Question
Most password attacks today are an offline attack.
Question
A TOTP changes after a set period.
Question
What type of attack involves using every possible combination of letters,numbers,and characters to create candidate digests that are then matched against those in a stolen digest file?

A)Space division
B)Brute force
C)Known ciphertext
D)Known plaintext
Question
What is the main weakness associated with the use of passwords?

A)human memory
B)encryption technology
C)handshake technology
D)human reliability
Question
Keystroke dynamics uses two unique typing variables.
Question
Which type of biometrics is based on the perception,thought process,and understanding of the user?

A)cognitive biometrics
B)reactive biometrics
C)standard biometrics
D)physical biometrics
Question
A secret combination of letters,numbers,and/or characters that only the user should have knowledge of,is known as a:

A)token
B)password
C)biometric detail
D)challenge
Question
The use of a single authentication credential that is shared across multiple networks is called:

A)access management
B)authorization management
C)identity management
D)risk management
Question
Hash algorithms like MD5 and SHA are considered secure for creating digests because these hashing algorithms are designed to create a digest as strong as possible.
Question
The use of what item below involves the creation of a large pre-generated data set of candidate digests?

A)rainbow tables
B)randomized character list
C)word list
D)cascade tables
Question
Open ID Connect is an Authentication protocol that can be used in OAuth 2.0 as a standard means to obtain user identity.
Question
Which of the following accounts is a user account that is created explicitly to provide a security context for services running on a server?

A)service account
B)shared account
C)system account
D)privileged account
Question
Which of the following is a category of group password settings in Microsoft Windows? (Choose all that apply. )

A)Password Policy Settings
B)Account Policy Settings
C)Password Lockout Policy
D)Account Lockout Policy
Question
If a user has more than one type of authentication credential,what type of authentication is being used?

A)pattern authentication
B)verified authentication
C)multifactor authentication
D)token authentication
Question
What federation system technology uses federation standards to provide SSO and exchanging attributes?

A)OAuth
B)Open ID Connect
C)Windows Live ID
D)Shibboleth
Question
Which of the following is a is a two-way relationship that is automatically created between parent and child domains in a Microsoft Active Directory forest?

A)double trust
B)federated trust
C)transitive trust
D)domain trust
Question
What type of authentication is based on what the user has?

A)software token
B)hardware token
C)security token
D)identity token
Question
What specific type of authentication can be based on where the user is located?

A)GPS
B)somewhere locating
C)geocache
D)geolocation
Question
What term best describes managing the login credentials such as passwords in user accounts?

A)account management
B)user management
C)credential management
D)password management
Question
Which of the following are key stretching password hash algorithms? (Choose all that apply. )

A)bcrypt
B)PBKDF2
C)seq02
D)SHA-256
Question
What type of card contains an integrated circuit chip that can hold information,which then can be used as part of the authentication process?

A)smart card
B)SIM card
C)E-card
D)BioCard
Question
A list of the available nonkeyboard characters can be seen in Windows by opening what utility?

A)charmap.exe
B)charlist.exe
C)chardump.exe
D)listchar.exe
Question
What technology is an open source federation framework and supports the development of authorization protocols?

A)Shibboleth
B)OAuth
C)SAML
D)Kerberos
Question
What type of attack conducts a statistical analysis of the stolen passwords that is then used to create a mask to break the largest number of passwords?

A)character set attack
B)binary attack
C)mask attack
D)rule attack
Question
What federated identity management (FIM)relies on token credentials?

A)OAuth
B)OpenID
C)Shibboleth
D)OpenPass
Question
What option below represents an example of behavioral biometrics?

A)user dynamics
B)keystroke dynamics
C)facial recognition
D)fingerprint recognition
Question
Which of the following options prevents a logon after a set number of failed logon attempts within a specified period and can also specify the length of time that the lockout is in force?

A)password lock
B)logon lock
C)password lockout
D)logon lockout
Question
A U.S.Department of Defense (DoD)smart card that is used for identification of active-duty and reserve military personnel along with civilian employees and special contractors is called:

A)Common Access Card (CAC)
B)Identity Validation Card (IVC)
C)Credential Validation Card (CVC)
D)Personal Credential Card (PCC)
Question
Which of the following is NOT a valid biometric disadvantage?

A)crossover error rate
B)false acceptance rate
C)false error rate
D)false rejection rate
Question
What can be used to increase the strength of hashed passwords?

A)salt
B)key stretching
C)double hashing
D)single crypting
Question
Which of the following account lockout policy settings determines the number of failed login attempts before a lockout occurs?

A)system lockout threshold
B)account lockout threshold
C)administrator lockout threshold
D)user lockout threshold
Question
Why do passwords place a heavy load on human memory?
Question
Describe how rainbow tables work.
Question
What smartcard standard is used to cover all U.S.government employees?
Question
Discuss the types of shortcuts that users take to help them recall their passwords.
Question
What are the three advantages of a rainbow table over other password attacks?
Question
How does a retina scanner work?
Question
What is the difference between multifactor authentication and single-factor authentication?
Question
Why should account passwords be disabled instead of the account being immediately deleted?
Question
How does an iris scanner work?
Question
What is a dictionary attack?
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/50
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 11: Authentication and Account Management
1
The use of one authentication credential to access multiple accounts or applications is referred to as which of the following?

A)individual Sign On
B)single Sign On
C)unilateral Sign On
D)federated Sign On
B
2
Which term below describes the time it takes for a key to be pressed and then released?

A)dwell time
B)lead time
C)sync time
D)react time
A
3
A retina scanner has become the most common type of standard biometrics.
False
4
Passwords provide strong protection.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
5
What variation of a dictionary attack involves a dictionary attack combined with a brute force attack,and will slightly alter dictionary words by adding numbers to the end of the password,spelling words backward,slightly misspelling words,or including special characters?

A)brute force
B)hash replay
C)network replay
D)hybrid
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
6
A hardware security token is typically a small device with a window display.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
7
Brute force attacks can be very slow because every character combination must be generated.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
8
Voice recognition is identical to speech recognition.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
9
What kind of biometrics utilizes a person's unique physical characteristics for authentication,such as fingerprints or unique characteristics of a person's face?

A)cognitive biometrics
B)reactive biometrics
C)standard biometrics
D)physical biometrics
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
10
Most password attacks today are an offline attack.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
11
A TOTP changes after a set period.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
12
What type of attack involves using every possible combination of letters,numbers,and characters to create candidate digests that are then matched against those in a stolen digest file?

A)Space division
B)Brute force
C)Known ciphertext
D)Known plaintext
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
13
What is the main weakness associated with the use of passwords?

A)human memory
B)encryption technology
C)handshake technology
D)human reliability
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
14
Keystroke dynamics uses two unique typing variables.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
15
Which type of biometrics is based on the perception,thought process,and understanding of the user?

A)cognitive biometrics
B)reactive biometrics
C)standard biometrics
D)physical biometrics
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
16
A secret combination of letters,numbers,and/or characters that only the user should have knowledge of,is known as a:

A)token
B)password
C)biometric detail
D)challenge
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
17
The use of a single authentication credential that is shared across multiple networks is called:

A)access management
B)authorization management
C)identity management
D)risk management
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
18
Hash algorithms like MD5 and SHA are considered secure for creating digests because these hashing algorithms are designed to create a digest as strong as possible.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
19
The use of what item below involves the creation of a large pre-generated data set of candidate digests?

A)rainbow tables
B)randomized character list
C)word list
D)cascade tables
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
20
Open ID Connect is an Authentication protocol that can be used in OAuth 2.0 as a standard means to obtain user identity.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
21
Which of the following accounts is a user account that is created explicitly to provide a security context for services running on a server?

A)service account
B)shared account
C)system account
D)privileged account
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
22
Which of the following is a category of group password settings in Microsoft Windows? (Choose all that apply. )

A)Password Policy Settings
B)Account Policy Settings
C)Password Lockout Policy
D)Account Lockout Policy
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
23
If a user has more than one type of authentication credential,what type of authentication is being used?

A)pattern authentication
B)verified authentication
C)multifactor authentication
D)token authentication
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
24
What federation system technology uses federation standards to provide SSO and exchanging attributes?

A)OAuth
B)Open ID Connect
C)Windows Live ID
D)Shibboleth
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
25
Which of the following is a is a two-way relationship that is automatically created between parent and child domains in a Microsoft Active Directory forest?

A)double trust
B)federated trust
C)transitive trust
D)domain trust
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
26
What type of authentication is based on what the user has?

A)software token
B)hardware token
C)security token
D)identity token
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
27
What specific type of authentication can be based on where the user is located?

A)GPS
B)somewhere locating
C)geocache
D)geolocation
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
28
What term best describes managing the login credentials such as passwords in user accounts?

A)account management
B)user management
C)credential management
D)password management
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
29
Which of the following are key stretching password hash algorithms? (Choose all that apply. )

A)bcrypt
B)PBKDF2
C)seq02
D)SHA-256
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
30
What type of card contains an integrated circuit chip that can hold information,which then can be used as part of the authentication process?

A)smart card
B)SIM card
C)E-card
D)BioCard
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
31
A list of the available nonkeyboard characters can be seen in Windows by opening what utility?

A)charmap.exe
B)charlist.exe
C)chardump.exe
D)listchar.exe
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
32
What technology is an open source federation framework and supports the development of authorization protocols?

A)Shibboleth
B)OAuth
C)SAML
D)Kerberos
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
33
What type of attack conducts a statistical analysis of the stolen passwords that is then used to create a mask to break the largest number of passwords?

A)character set attack
B)binary attack
C)mask attack
D)rule attack
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
34
What federated identity management (FIM)relies on token credentials?

A)OAuth
B)OpenID
C)Shibboleth
D)OpenPass
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
35
What option below represents an example of behavioral biometrics?

A)user dynamics
B)keystroke dynamics
C)facial recognition
D)fingerprint recognition
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
36
Which of the following options prevents a logon after a set number of failed logon attempts within a specified period and can also specify the length of time that the lockout is in force?

A)password lock
B)logon lock
C)password lockout
D)logon lockout
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
37
A U.S.Department of Defense (DoD)smart card that is used for identification of active-duty and reserve military personnel along with civilian employees and special contractors is called:

A)Common Access Card (CAC)
B)Identity Validation Card (IVC)
C)Credential Validation Card (CVC)
D)Personal Credential Card (PCC)
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
38
Which of the following is NOT a valid biometric disadvantage?

A)crossover error rate
B)false acceptance rate
C)false error rate
D)false rejection rate
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
39
What can be used to increase the strength of hashed passwords?

A)salt
B)key stretching
C)double hashing
D)single crypting
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
40
Which of the following account lockout policy settings determines the number of failed login attempts before a lockout occurs?

A)system lockout threshold
B)account lockout threshold
C)administrator lockout threshold
D)user lockout threshold
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
41
Why do passwords place a heavy load on human memory?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
42
Describe how rainbow tables work.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
43
What smartcard standard is used to cover all U.S.government employees?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
44
Discuss the types of shortcuts that users take to help them recall their passwords.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
45
What are the three advantages of a rainbow table over other password attacks?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
46
How does a retina scanner work?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
47
What is the difference between multifactor authentication and single-factor authentication?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
48
Why should account passwords be disabled instead of the account being immediately deleted?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
49
How does an iris scanner work?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
50
What is a dictionary attack?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 50 flashcards in this deck.