Chapter 12 Flashcards
A secret combination of letters, numbers, and/or characters that only the user should have knowledge
of, is known as a:
Password
What is the center of the weakness of passwords?
Human memory
Passwords that are transmitted can be captured by what type of software?
Protocol analyzer
What type of attack involves an attacker stealing a file containing password digests and comparing the
digests with digests created by the attacker?
Offline cracking
What type of attack involves using every possible combination of letters, numbers, and characters to
create candidate digests that are then matched against those in a stolen digest file?
Brute force
What variation of a dictionary attack involves a dictionary attack combined with a brute force attack,
and will slightly alter dictionary words by adding numbers to the end of the password, spelling words
backward, slightly misspelling words, or including special characters?
Hybrid
The use of what item below involves the creation of a large pregenerated data set of candidate digests?
Rainbow tables
What kind of biometrics utilizes a person’s unique physical characteristics for authentication, such as
fingerprints or unique characteristics of a person’s face?
Standard biometrics
Which term below describes the time it takes for a key to be pressed and then released?
Dwell time
Which type of biometrics is based on the perception, thought process, and understanding of the user?
Cognitive
The use of a single authentication credential that is shared across multiple networks is called:
Identity management
The use of one authentication credential to access multiple accounts or applications is referred to as?
Single sign on
What technology allows users to share resources stored on one site with a second site without
forwarding their authentication credentials to the other site?
OAuth
Select below the decentralized open-source FIM that does not require specific software to be installed
on the desktop:
OpenID
What federated identity management (FIM) relies on token credentials?
OAuth
A U.S. Department of Defense (DoD) smart card that is used for identification of active-duty and
reserve military personnel along with civilian employees and special contractors is called:
Common Access Card (CAC)
What can be used to increase the strength of hashed passwords?
Salt
A list of the available nonkeyboard characters can be seen in Windows by opening what utility?
charmap.exe
Which hashing algorithm below is used with NTLMv2’s Hashed Message Authentication Code?
MD5
What type of one-time password (OTP) changes after a set time period?
Time-based one-time password (TOTP)