Deck 10: Authentication and Account Management

ملء الشاشة (f)
exit full mode
سؤال
Due to the limitations of online guessing, most password attacks today use ____.

A) offline cracking
B) online cracking
C) hash replay
D) token replay
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
____ accepts spoken words for input as if they had been typed on the keyboard.

A) Text recognition
B) Speech differentiation
C) Linguistic recognition
D) Speech recognition
سؤال
Token credentials can be revoked at any time by the user without affecting other token credentials issued to other sites.
سؤال
A(n) ____ can also capture transmissions that contain passwords.

A) application analyzer
B) system analyzer
C) function analyzer
D) protocol analyzer
سؤال
____ attack is where every possible combination of letters, numbers, and characters is used to create encrypted passwords.

A) Space division
B) Brute force
C) Known ciphertext
D) Known plaintext
سؤال
The set of letters, symbols, and characters that make up the password are known as a ____ set.

A) result
B) problem
C) character
D) search
سؤال
Using a rainbow table to crack a password requires three steps.
سؤال
Trusted OSs have been used since the late 1960s, initially for government and military applications.
سؤال
If a user typically accesses his bank's Web site from his home computer on nights and weekends, then this information can be used to establish a ____ of typical access.

A) usage map
B) computer footprint
C) beachhead
D) system
سؤال
____ is the time it takes for a key to be pressed and then released.

A) Dwell time
B) Lead time
C) Sync time
D) Show time
سؤال
To create a rainbow table, each ____ begins with an initial password that is encrypted.

A) link
B) chain
C) pass
D) block
سؤال
____ is related to the perception, thought process, and understanding of the user.

A) Standard biometrics
B) Reactive biometrics
C) Cognitive biometrics
D) Affective biometrics
سؤال
The weakness of passwords centers on ____.

A) human memory
B) encryption technology
C) handshake technology
D) human reliability
سؤال
Although brute force and dictionary attacks were once the primary tools used by attackers to crack an encrypted password, today attackers usually prefer ____.

A) rainbow tables
B) online cracking
C) offline cracking
D) cascade tables
سؤال
Passwords provide strong protection.
سؤال
It is predicted that ____ could become a key element in authentication in the future.

A) cognitive biometrics
B) standard biometrics
C) reactive biometrics
D) affective biometrics
سؤال
____ can use fingerprints or other unique characteristics of a person's face, hands, or eyes (irises and retinas) to authenticate a user.

A) Cognitive biometrics
B) Reactive biometrics
C) Standard biometrics
D) Affective biometrics
سؤال
Today's operating systems have roots dating back 20 or more years, well before security was identified as a critical process.
سؤال
A ____ is a secret combination of letters, numbers, and/or characters that only the user should know.

A) token
B) password
C) biometric detail
D) challenge
سؤال
The ____ attack will slightly alter dictionary words by adding numbers to the end of the password, spelling words backward, slightly misspelling words, or including special characters such as @, $, !, or %.

A) brute force
B) hash replay
C) network replay
D) hybrid
سؤال
Microsoft is Windows ____ is a feature of Windows that is intended to provide users with control of their digital identities while helping them to manage privacy.

A) CAPI
B) MAPI
C) CardSpace
D) CryptoAPI
سؤال
____ is using a single authentication credential that is shared across multiple networks.

A) Access management
B) Authorization management
C) Identity management
D) Risk management
سؤال
____ permits users to share resources stored on one site with a second site without forwarding their authentication credentials to the other site.

A) OpenAuth
B) OAuth
C) SAML
D) Kerberos
سؤال
Explain how an attacker can use a resetting attack.
سؤال
A(n) ____________________ attack begins with the attacker creating encrypted versions of common dictionary words, and then comparing them against those in a stolen password file.
سؤال
What are the three broad categories on which authentication can be based?
سؤال
Describe how rainbow tables work.
سؤال
List and describe two of the common password setting objects.
سؤال
Discuss the types of shortcuts that users take to help them recall their passwords.
سؤال
A token ____________________ is a unique random string of characters that is encrypted to protect the token from being used by unauthorized parties.
سؤال
An operating system that has been reengineered so that it is designed to be secure from the ground up is known as a ____.

A) reference monitor
B) transaction monitor
C) system monitor
D) trusted OS
سؤال
____ holds the promise of reducing the number of usernames and passwords that users must memorize.

A) ISO
B) SSO
C) SSL
D) IAM
سؤال
The most common type of authentication today is a(n) ____________________.
سؤال
Windows Live ID was originally designed as a ____ system that would be used by a wide variety of Web servers.

A) federated identity management
B) liberated identity management
C) central identity management
D) distributed identity management
سؤال
____________________ is a decentralized open source FIM that does not require specific software to be installed on the desktop.
سؤال
In most systems, a user logging in would be asked to ____________________ herself.
سؤال
Why do passwords place a heavy load on human memory?
سؤال
What are the three advantages of a rainbow table over other password attacks?
سؤال
Discuss the weaknesses of OpenID.
سؤال
Identify two basic flows that operating systems can have.
سؤال
Discuss the focus of the OS vendors developing trusted OSs.
سؤال
Match between columns
A government standard for smart cards that covers all government employees
Standard biometrics
A government standard for smart cards that covers all government employees
Brute force
A government standard for smart cards that covers all government employees
Rainbow tables
A government standard for smart cards that covers all government employees
CAC
A government standard for smart cards that covers all government employees
PIV
A government standard for smart cards that covers all government employees
Token
A government standard for smart cards that covers all government employees
Behavioral biometrics
A government standard for smart cards that covers all government employees
Hybrid
A government standard for smart cards that covers all government employees
Account Lockout Policy
A Department of Defense (DoD) smart card used for identification for active-duty and reserve military personnel along with civilian employees and special contractors
Standard biometrics
A Department of Defense (DoD) smart card used for identification for active-duty and reserve military personnel along with civilian employees and special contractors
Brute force
A Department of Defense (DoD) smart card used for identification for active-duty and reserve military personnel along with civilian employees and special contractors
Rainbow tables
A Department of Defense (DoD) smart card used for identification for active-duty and reserve military personnel along with civilian employees and special contractors
CAC
A Department of Defense (DoD) smart card used for identification for active-duty and reserve military personnel along with civilian employees and special contractors
PIV
A Department of Defense (DoD) smart card used for identification for active-duty and reserve military personnel along with civilian employees and special contractors
Token
A Department of Defense (DoD) smart card used for identification for active-duty and reserve military personnel along with civilian employees and special contractors
Behavioral biometrics
A Department of Defense (DoD) smart card used for identification for active-duty and reserve military personnel along with civilian employees and special contractors
Hybrid
A Department of Defense (DoD) smart card used for identification for active-duty and reserve military personnel along with civilian employees and special contractors
Account Lockout Policy
A password attack in which every possible combination of letters, numbers, and characters is used to create encrypted passwords that are matched with those in a stolen password file
Standard biometrics
A password attack in which every possible combination of letters, numbers, and characters is used to create encrypted passwords that are matched with those in a stolen password file
Brute force
A password attack in which every possible combination of letters, numbers, and characters is used to create encrypted passwords that are matched with those in a stolen password file
Rainbow tables
A password attack in which every possible combination of letters, numbers, and characters is used to create encrypted passwords that are matched with those in a stolen password file
CAC
A password attack in which every possible combination of letters, numbers, and characters is used to create encrypted passwords that are matched with those in a stolen password file
PIV
A password attack in which every possible combination of letters, numbers, and characters is used to create encrypted passwords that are matched with those in a stolen password file
Token
A password attack in which every possible combination of letters, numbers, and characters is used to create encrypted passwords that are matched with those in a stolen password file
Behavioral biometrics
A password attack in which every possible combination of letters, numbers, and characters is used to create encrypted passwords that are matched with those in a stolen password file
Hybrid
A password attack in which every possible combination of letters, numbers, and characters is used to create encrypted passwords that are matched with those in a stolen password file
Account Lockout Policy
Prevents a logon after a set number of failed logon attempts within a specified period
Standard biometrics
Prevents a logon after a set number of failed logon attempts within a specified period
Brute force
Prevents a logon after a set number of failed logon attempts within a specified period
Rainbow tables
Prevents a logon after a set number of failed logon attempts within a specified period
CAC
Prevents a logon after a set number of failed logon attempts within a specified period
PIV
Prevents a logon after a set number of failed logon attempts within a specified period
Token
Prevents a logon after a set number of failed logon attempts within a specified period
Behavioral biometrics
Prevents a logon after a set number of failed logon attempts within a specified period
Hybrid
Prevents a logon after a set number of failed logon attempts within a specified period
Account Lockout Policy
Authenticating a user by the normal actions that the user performs
Standard biometrics
Authenticating a user by the normal actions that the user performs
Brute force
Authenticating a user by the normal actions that the user performs
Rainbow tables
Authenticating a user by the normal actions that the user performs
CAC
Authenticating a user by the normal actions that the user performs
PIV
Authenticating a user by the normal actions that the user performs
Token
Authenticating a user by the normal actions that the user performs
Behavioral biometrics
Authenticating a user by the normal actions that the user performs
Hybrid
Authenticating a user by the normal actions that the user performs
Account Lockout Policy
Make password attacks easier by creating a large pregenerated data set of encrypted passwords
Standard biometrics
Make password attacks easier by creating a large pregenerated data set of encrypted passwords
Brute force
Make password attacks easier by creating a large pregenerated data set of encrypted passwords
Rainbow tables
Make password attacks easier by creating a large pregenerated data set of encrypted passwords
CAC
Make password attacks easier by creating a large pregenerated data set of encrypted passwords
PIV
Make password attacks easier by creating a large pregenerated data set of encrypted passwords
Token
Make password attacks easier by creating a large pregenerated data set of encrypted passwords
Behavioral biometrics
Make password attacks easier by creating a large pregenerated data set of encrypted passwords
Hybrid
Make password attacks easier by creating a large pregenerated data set of encrypted passwords
Account Lockout Policy
A small device that can be affixed to a keychain with a window display that shows a code to be used for authentication
Standard biometrics
A small device that can be affixed to a keychain with a window display that shows a code to be used for authentication
Brute force
A small device that can be affixed to a keychain with a window display that shows a code to be used for authentication
Rainbow tables
A small device that can be affixed to a keychain with a window display that shows a code to be used for authentication
CAC
A small device that can be affixed to a keychain with a window display that shows a code to be used for authentication
PIV
A small device that can be affixed to a keychain with a window display that shows a code to be used for authentication
Token
A small device that can be affixed to a keychain with a window display that shows a code to be used for authentication
Behavioral biometrics
A small device that can be affixed to a keychain with a window display that shows a code to be used for authentication
Hybrid
A small device that can be affixed to a keychain with a window display that shows a code to be used for authentication
Account Lockout Policy
A password attack that slightly alters dictionary words by adding numbers to the end of the password, spelling words backward, slightly misspelling words, or including special characters
Standard biometrics
A password attack that slightly alters dictionary words by adding numbers to the end of the password, spelling words backward, slightly misspelling words, or including special characters
Brute force
A password attack that slightly alters dictionary words by adding numbers to the end of the password, spelling words backward, slightly misspelling words, or including special characters
Rainbow tables
A password attack that slightly alters dictionary words by adding numbers to the end of the password, spelling words backward, slightly misspelling words, or including special characters
CAC
A password attack that slightly alters dictionary words by adding numbers to the end of the password, spelling words backward, slightly misspelling words, or including special characters
PIV
A password attack that slightly alters dictionary words by adding numbers to the end of the password, spelling words backward, slightly misspelling words, or including special characters
Token
A password attack that slightly alters dictionary words by adding numbers to the end of the password, spelling words backward, slightly misspelling words, or including special characters
Behavioral biometrics
A password attack that slightly alters dictionary words by adding numbers to the end of the password, spelling words backward, slightly misspelling words, or including special characters
Hybrid
A password attack that slightly alters dictionary words by adding numbers to the end of the password, spelling words backward, slightly misspelling words, or including special characters
Account Lockout Policy
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/42
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 10: Authentication and Account Management
1
Due to the limitations of online guessing, most password attacks today use ____.

A) offline cracking
B) online cracking
C) hash replay
D) token replay
A
2
____ accepts spoken words for input as if they had been typed on the keyboard.

A) Text recognition
B) Speech differentiation
C) Linguistic recognition
D) Speech recognition
D
3
Token credentials can be revoked at any time by the user without affecting other token credentials issued to other sites.
True
4
A(n) ____ can also capture transmissions that contain passwords.

A) application analyzer
B) system analyzer
C) function analyzer
D) protocol analyzer
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
5
____ attack is where every possible combination of letters, numbers, and characters is used to create encrypted passwords.

A) Space division
B) Brute force
C) Known ciphertext
D) Known plaintext
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
6
The set of letters, symbols, and characters that make up the password are known as a ____ set.

A) result
B) problem
C) character
D) search
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
7
Using a rainbow table to crack a password requires three steps.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
8
Trusted OSs have been used since the late 1960s, initially for government and military applications.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
9
If a user typically accesses his bank's Web site from his home computer on nights and weekends, then this information can be used to establish a ____ of typical access.

A) usage map
B) computer footprint
C) beachhead
D) system
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
10
____ is the time it takes for a key to be pressed and then released.

A) Dwell time
B) Lead time
C) Sync time
D) Show time
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
11
To create a rainbow table, each ____ begins with an initial password that is encrypted.

A) link
B) chain
C) pass
D) block
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
12
____ is related to the perception, thought process, and understanding of the user.

A) Standard biometrics
B) Reactive biometrics
C) Cognitive biometrics
D) Affective biometrics
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
13
The weakness of passwords centers on ____.

A) human memory
B) encryption technology
C) handshake technology
D) human reliability
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
14
Although brute force and dictionary attacks were once the primary tools used by attackers to crack an encrypted password, today attackers usually prefer ____.

A) rainbow tables
B) online cracking
C) offline cracking
D) cascade tables
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
15
Passwords provide strong protection.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
16
It is predicted that ____ could become a key element in authentication in the future.

A) cognitive biometrics
B) standard biometrics
C) reactive biometrics
D) affective biometrics
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
17
____ can use fingerprints or other unique characteristics of a person's face, hands, or eyes (irises and retinas) to authenticate a user.

A) Cognitive biometrics
B) Reactive biometrics
C) Standard biometrics
D) Affective biometrics
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
18
Today's operating systems have roots dating back 20 or more years, well before security was identified as a critical process.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
19
A ____ is a secret combination of letters, numbers, and/or characters that only the user should know.

A) token
B) password
C) biometric detail
D) challenge
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
20
The ____ attack will slightly alter dictionary words by adding numbers to the end of the password, spelling words backward, slightly misspelling words, or including special characters such as @, $, !, or %.

A) brute force
B) hash replay
C) network replay
D) hybrid
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
21
Microsoft is Windows ____ is a feature of Windows that is intended to provide users with control of their digital identities while helping them to manage privacy.

A) CAPI
B) MAPI
C) CardSpace
D) CryptoAPI
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
22
____ is using a single authentication credential that is shared across multiple networks.

A) Access management
B) Authorization management
C) Identity management
D) Risk management
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
23
____ permits users to share resources stored on one site with a second site without forwarding their authentication credentials to the other site.

A) OpenAuth
B) OAuth
C) SAML
D) Kerberos
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
24
Explain how an attacker can use a resetting attack.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
25
A(n) ____________________ attack begins with the attacker creating encrypted versions of common dictionary words, and then comparing them against those in a stolen password file.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
26
What are the three broad categories on which authentication can be based?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
27
Describe how rainbow tables work.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
28
List and describe two of the common password setting objects.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
29
Discuss the types of shortcuts that users take to help them recall their passwords.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
30
A token ____________________ is a unique random string of characters that is encrypted to protect the token from being used by unauthorized parties.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
31
An operating system that has been reengineered so that it is designed to be secure from the ground up is known as a ____.

A) reference monitor
B) transaction monitor
C) system monitor
D) trusted OS
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
32
____ holds the promise of reducing the number of usernames and passwords that users must memorize.

A) ISO
B) SSO
C) SSL
D) IAM
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
33
The most common type of authentication today is a(n) ____________________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
34
Windows Live ID was originally designed as a ____ system that would be used by a wide variety of Web servers.

A) federated identity management
B) liberated identity management
C) central identity management
D) distributed identity management
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
35
____________________ is a decentralized open source FIM that does not require specific software to be installed on the desktop.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
36
In most systems, a user logging in would be asked to ____________________ herself.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
37
Why do passwords place a heavy load on human memory?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
38
What are the three advantages of a rainbow table over other password attacks?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
39
Discuss the weaknesses of OpenID.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
40
Identify two basic flows that operating systems can have.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
41
Discuss the focus of the OS vendors developing trusted OSs.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
42
Match between columns
A government standard for smart cards that covers all government employees
Standard biometrics
A government standard for smart cards that covers all government employees
Brute force
A government standard for smart cards that covers all government employees
Rainbow tables
A government standard for smart cards that covers all government employees
CAC
A government standard for smart cards that covers all government employees
PIV
A government standard for smart cards that covers all government employees
Token
A government standard for smart cards that covers all government employees
Behavioral biometrics
A government standard for smart cards that covers all government employees
Hybrid
A government standard for smart cards that covers all government employees
Account Lockout Policy
A Department of Defense (DoD) smart card used for identification for active-duty and reserve military personnel along with civilian employees and special contractors
Standard biometrics
A Department of Defense (DoD) smart card used for identification for active-duty and reserve military personnel along with civilian employees and special contractors
Brute force
A Department of Defense (DoD) smart card used for identification for active-duty and reserve military personnel along with civilian employees and special contractors
Rainbow tables
A Department of Defense (DoD) smart card used for identification for active-duty and reserve military personnel along with civilian employees and special contractors
CAC
A Department of Defense (DoD) smart card used for identification for active-duty and reserve military personnel along with civilian employees and special contractors
PIV
A Department of Defense (DoD) smart card used for identification for active-duty and reserve military personnel along with civilian employees and special contractors
Token
A Department of Defense (DoD) smart card used for identification for active-duty and reserve military personnel along with civilian employees and special contractors
Behavioral biometrics
A Department of Defense (DoD) smart card used for identification for active-duty and reserve military personnel along with civilian employees and special contractors
Hybrid
A Department of Defense (DoD) smart card used for identification for active-duty and reserve military personnel along with civilian employees and special contractors
Account Lockout Policy
A password attack in which every possible combination of letters, numbers, and characters is used to create encrypted passwords that are matched with those in a stolen password file
Standard biometrics
A password attack in which every possible combination of letters, numbers, and characters is used to create encrypted passwords that are matched with those in a stolen password file
Brute force
A password attack in which every possible combination of letters, numbers, and characters is used to create encrypted passwords that are matched with those in a stolen password file
Rainbow tables
A password attack in which every possible combination of letters, numbers, and characters is used to create encrypted passwords that are matched with those in a stolen password file
CAC
A password attack in which every possible combination of letters, numbers, and characters is used to create encrypted passwords that are matched with those in a stolen password file
PIV
A password attack in which every possible combination of letters, numbers, and characters is used to create encrypted passwords that are matched with those in a stolen password file
Token
A password attack in which every possible combination of letters, numbers, and characters is used to create encrypted passwords that are matched with those in a stolen password file
Behavioral biometrics
A password attack in which every possible combination of letters, numbers, and characters is used to create encrypted passwords that are matched with those in a stolen password file
Hybrid
A password attack in which every possible combination of letters, numbers, and characters is used to create encrypted passwords that are matched with those in a stolen password file
Account Lockout Policy
Prevents a logon after a set number of failed logon attempts within a specified period
Standard biometrics
Prevents a logon after a set number of failed logon attempts within a specified period
Brute force
Prevents a logon after a set number of failed logon attempts within a specified period
Rainbow tables
Prevents a logon after a set number of failed logon attempts within a specified period
CAC
Prevents a logon after a set number of failed logon attempts within a specified period
PIV
Prevents a logon after a set number of failed logon attempts within a specified period
Token
Prevents a logon after a set number of failed logon attempts within a specified period
Behavioral biometrics
Prevents a logon after a set number of failed logon attempts within a specified period
Hybrid
Prevents a logon after a set number of failed logon attempts within a specified period
Account Lockout Policy
Authenticating a user by the normal actions that the user performs
Standard biometrics
Authenticating a user by the normal actions that the user performs
Brute force
Authenticating a user by the normal actions that the user performs
Rainbow tables
Authenticating a user by the normal actions that the user performs
CAC
Authenticating a user by the normal actions that the user performs
PIV
Authenticating a user by the normal actions that the user performs
Token
Authenticating a user by the normal actions that the user performs
Behavioral biometrics
Authenticating a user by the normal actions that the user performs
Hybrid
Authenticating a user by the normal actions that the user performs
Account Lockout Policy
Make password attacks easier by creating a large pregenerated data set of encrypted passwords
Standard biometrics
Make password attacks easier by creating a large pregenerated data set of encrypted passwords
Brute force
Make password attacks easier by creating a large pregenerated data set of encrypted passwords
Rainbow tables
Make password attacks easier by creating a large pregenerated data set of encrypted passwords
CAC
Make password attacks easier by creating a large pregenerated data set of encrypted passwords
PIV
Make password attacks easier by creating a large pregenerated data set of encrypted passwords
Token
Make password attacks easier by creating a large pregenerated data set of encrypted passwords
Behavioral biometrics
Make password attacks easier by creating a large pregenerated data set of encrypted passwords
Hybrid
Make password attacks easier by creating a large pregenerated data set of encrypted passwords
Account Lockout Policy
A small device that can be affixed to a keychain with a window display that shows a code to be used for authentication
Standard biometrics
A small device that can be affixed to a keychain with a window display that shows a code to be used for authentication
Brute force
A small device that can be affixed to a keychain with a window display that shows a code to be used for authentication
Rainbow tables
A small device that can be affixed to a keychain with a window display that shows a code to be used for authentication
CAC
A small device that can be affixed to a keychain with a window display that shows a code to be used for authentication
PIV
A small device that can be affixed to a keychain with a window display that shows a code to be used for authentication
Token
A small device that can be affixed to a keychain with a window display that shows a code to be used for authentication
Behavioral biometrics
A small device that can be affixed to a keychain with a window display that shows a code to be used for authentication
Hybrid
A small device that can be affixed to a keychain with a window display that shows a code to be used for authentication
Account Lockout Policy
A password attack that slightly alters dictionary words by adding numbers to the end of the password, spelling words backward, slightly misspelling words, or including special characters
Standard biometrics
A password attack that slightly alters dictionary words by adding numbers to the end of the password, spelling words backward, slightly misspelling words, or including special characters
Brute force
A password attack that slightly alters dictionary words by adding numbers to the end of the password, spelling words backward, slightly misspelling words, or including special characters
Rainbow tables
A password attack that slightly alters dictionary words by adding numbers to the end of the password, spelling words backward, slightly misspelling words, or including special characters
CAC
A password attack that slightly alters dictionary words by adding numbers to the end of the password, spelling words backward, slightly misspelling words, or including special characters
PIV
A password attack that slightly alters dictionary words by adding numbers to the end of the password, spelling words backward, slightly misspelling words, or including special characters
Token
A password attack that slightly alters dictionary words by adding numbers to the end of the password, spelling words backward, slightly misspelling words, or including special characters
Behavioral biometrics
A password attack that slightly alters dictionary words by adding numbers to the end of the password, spelling words backward, slightly misspelling words, or including special characters
Hybrid
A password attack that slightly alters dictionary words by adding numbers to the end of the password, spelling words backward, slightly misspelling words, or including special characters
Account Lockout Policy
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.