Multiple Choice
Matching
-Five elements that can prove the genuineness of a user: what you know, what you have, what you are, what you do, and where you are.
A) Authentication factors
B) Bcrypt
C) Brute force attack
D) Dictionary attack
E) Hybrid attack
F) Key stretching
G) NTLM (New Technology LAN Manager) hash
H) Salt
I) Single sign-on
J) Token
Correct Answer:

Verified
Correct Answer:
Verified
Q1: Passwords that are transmitted can be captured
Q2: Matching<br>-A random string that is used in
Q3: Matching<br>-A password hashing algorithm that requires significantly
Q4: Discuss the types of shortcuts that users
Q6: Discuss the weaknesses of OpenID.
Q7: Which hashing algorithm below is used with
Q9: Matching<br>-A small device that can be affixed
Q10: Matching<br>-A password attack in which every possible
Q40: Why do passwords place a heavy load
Q50: A U.S.Department of Defense (DoD)smart card that