MOD 12 Flashcards

1
Q

What is the act of verifying a claimed identity?

A

User authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

User authentication sources are something the user: _____, _______, and ______.

A

Knows, Has , Is

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a combination of something the user knows, has, and is?

A

multifactor authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What shines certain wavelength of lights into eyes at close range?

A

Retinal scan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What takes a picture of the iris using ultraviolet light?

A

Iris scan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which attack consists of guessing the password by trying possibilities from a long list?

A

Dictionary attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are pre-computed hashes used as lookups?

A

Rainbow tables

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are all the possible combinations given any constraints?

A

Key Space

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Forcing users to include an upper case character and a number ________ the key space.

A

reduces

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

8 character passwords for all lower case letters is?

A

26^8

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

9 character passwords for all lower case letters is?

A

26^9

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

8 character passwords for all upper and lower case letters is?

A

52^8

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

8 character alphanumeric is?

A

62^8

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

9 character alphanumeric is?

A

62^9

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Army is now using ____ character passwords

A

12

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

In a database, we store the _____, not the password

A

hash

17
Q

To make attacks more difficult, we _______ the password

A

SALT

18
Q

What surfing tactic is following someone who used an access card/PIN to gain access to a room?

A

Piggybacking surfing

19
Q

What surfing tactic has attackers position themselves to watch a user enter the correct password?

A

Shoulder surfing

20
Q

What is it called when an attacker goes through the target’s trash to find information?

A

Dumpster diving

21
Q

What was an early 90s hacker collective that dumpster dived?

A

L0pht Heavy Industries