Select below the decentralized open-source FIM that does not require specific software to be installed on the desktop: |
OpenID |
Which hashing algorithm below is used with NTLMv2’s Hashed Message Authentication Code? |
MD5 |
Passwords that are transmitted can be captured by what type of software? |
protocol analyzer |
What variation of a dictionary attack involves a dictionary attack combined with a brute force attack, and will slightly alter dictionary words by adding numbers to the end of the password, spelling words backward, slightly misspelling words, or including special characters? |
hybrid |
What federated identity management (FIM) relies on token credentials? |
OAuth |
Token credentials can be revoked at any time by the user without affecting other token credentials issued to other sites. |
True |
The use of one authentication credential to access multiple accounts or applications is referred to as? |
Single Sign On |
Using a rainbow table to crack a password requires three steps: Creation of the table, comparing the table to known hash values, and decrypting the password. |
False |
What technology allows users to share resources stored on one site with a second site without forwarding their authentication credentials to the other site? |
OAuth |
What type of one-time password (OTP) changes after a set time period? |
HMAC-Based one-time password (HOTP) |
What is the center of the weakness of passwords? |
human memory |
A U.S. Department of Defense (DoD) smart card that is used for identification of active-duty and reserve military personnel along with civilian employees and special contractors is called: |
Common Access Card (CAC) |
What type of attack involves using every possible combination of letters, numbers, and characters to create candidate digests that are then matched against those in a stolen digest file? |
Brute force |
What kind of biometrics utilizes a person’s unique physical characteristics for authentication, such as fingerprints or unique characteristics of a person’s face? |
Standard biometrics |
What can be used to increase the strength of hashed passwords? |
Salt |
A secret combination of letters, numbers, and/or characters that only the user should have knowledge of, is known as a: |
password |
Passwords provide strong protection. |
False |
The use of what item below involves the creation of a large pregenerated data set of candidate digests? |
Rainbow tables |
A list of the available nonkeyboard characters can be seen in Windows by opening what utility? |
charmap.exe |
Which type of biometrics is based on the perception, thought process, and understanding of the user? |
Cognitive biometrics |
OpenID is an example of a web-based federated identity management (FIM) system. |
True |
Which term below describes the time it takes for a key to be pressed and then released? |
Dwell time |
Geolocation is the identification of the location of a person or object using technology, and can be used as part of an authentication method. |
True |
The use of a single authentication credential that is shared across multiple networks is called: |
Identity management |
What type of attack involves an attacker stealing a file containing password digests and comparing the digests with digests created by the attacker? |
offline cracking |
Week 12
Share This
Unfinished tasks keep piling up?
Let us complete them for you. Quickly and professionally.
Check Price