Week 3 Flashcards

1
Q

Name 3 Password Strategies

A
  • User education
  • Computer generated passwords
  • Reactive password checking
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Name 3 ways that Proactive password checking can be implemented

A

1_ Rule enforcement
2_ Password checker
3_ Bloom filter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Name 3 types of cards used as tokens

A

1- Embossed
2- Memory cards
3- Smart

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Give an example of what memory cards are used for

A

Hotel room

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Name 3 characteristics that are true of smart tokens

A
  • Include an embedded microprocessor
  • Contact and contact less interfaces
  • Require some user interface
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Name 3 electronic functions for eID cards

A
  • ePass
  • eID
  • eSign
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Password Authenticated Connection Establishment (PACE)?

A

Ensures that the contactless

RF chip in the eID card cannot be read without explicit access control.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is biometric authentication?

A

Attempts to authenticate based on physical characteristics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Why is remote user authentication more complex?

A

More susceptible to eavesdropping or capturing a password.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Name 3 authentication security issues

A
  • Denial-of-service
  • Eavesdropping
  • Trojan Horse
How well did you know this?
1
Not at all
2
3
4
5
Perfectly