Chapter 12 Flashcards

1
Q

A secret combination of letters, numbers, and/or characters that only the user should have knowledge
of, is known as a:

A

Password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the center of the weakness of passwords?

A

Human memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Passwords that are transmitted can be captured by what type of software?

A

Protocol analyzer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What type of attack involves an attacker stealing a file containing password digests and comparing the
digests with digests created by the attacker?

A

Offline cracking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What type of attack involves using every possible combination of letters, numbers, and characters to
create candidate digests that are then matched against those in a stolen digest file?

A

Brute force

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What variation of a dictionary attack involves a dictionary attack combined with a brute force attack,
and will slightly alter dictionary words by adding numbers to the end of the password, spelling words
backward, slightly misspelling words, or including special characters?

A

Hybrid

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The use of what item below involves the creation of a large pregenerated data set of candidate digests?

A

Rainbow tables

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What kind of biometrics utilizes a person’s unique physical characteristics for authentication, such as
fingerprints or unique characteristics of a person’s face?

A

Standard biometrics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which term below describes the time it takes for a key to be pressed and then released?

A

Dwell time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which type of biometrics is based on the perception, thought process, and understanding of the user?

A

Cognitive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The use of a single authentication credential that is shared across multiple networks is called:

A

Identity management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The use of one authentication credential to access multiple accounts or applications is referred to as?

A

Single sign on

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What technology allows users to share resources stored on one site with a second site without
forwarding their authentication credentials to the other site?

A

OAuth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Select below the decentralized open-source FIM that does not require specific software to be installed
on the desktop:

A

OpenID

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What federated identity management (FIM) relies on token credentials?

A

OAuth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A U.S. Department of Defense (DoD) smart card that is used for identification of active-duty and
reserve military personnel along with civilian employees and special contractors is called:

A

Common Access Card (CAC)

17
Q

What can be used to increase the strength of hashed passwords?

18
Q

A list of the available nonkeyboard characters can be seen in Windows by opening what utility?

A

charmap.exe

19
Q

Which hashing algorithm below is used with NTLMv2’s Hashed Message Authentication Code?

20
Q

What type of one-time password (OTP) changes after a set time period?

A

Time-based one-time password (TOTP)