Deck 12: Authentication and Account Management

ملء الشاشة (f)
exit full mode
سؤال
What type of attack involves an attacker stealing a file containing password digests and comparing the digests with digests created by the attacker?

A)offline cracking
B)online cracking
C)hash replay
D)token replay
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
What is the center of the weakness of passwords?

A)human memory
B)encryption technology
C)handshake technology
D)human reliability
سؤال
​Which hashing algorithm below is used with NTLMv2's Hashed Message Authentication Code?

A)​SHA-1
B)​SHA-256
C)​MD4
D)​MD5
سؤال
Geolocation is the identification of the location of a person or object using technology, and can be used as part of an authentication method.​
سؤال
Using a rainbow table to crack a password requires three steps: Creation of the table, comparing the table to known hash values, and decrypting the password.
سؤال
​What type of one-time password (OTP) changes after a set time period?

A)​HMAC-Based one-time password (HOTP)
B)​Period-based one-time password (POTP)
C)​Time-based one-time password (TOTP)
D)​Interval-based one-time password (IOTP)
سؤال
Which type of biometrics is based on the perception, thought process, and understanding of the user?

A)Standard biometrics
B)Reactive biometrics
C)Cognitive biometrics
D)Affective biometrics
سؤال
What type of attack involves using every possible combination of letters, numbers, and characters to create candidate digests that are then matched against those in a stolen digest file?

A)Space division
B)Brute force
C)Known ciphertext
D)Known plaintext
سؤال
Token credentials can be revoked at any time by the user without affecting other token credentials issued to other sites.
سؤال
The use of a single authentication credential that is shared across multiple networks is called:

A)Access management
B)Authorization management
C)Identity management
D)Risk management
سؤال
The use of what item below involves the creation of a large pregenerated data set of candidate digests?

A)Rainbow tables
B)Randomized character list
C)Word list
D)Cascade tables
سؤال
OpenID is an example of a web-based federated identity management (FIM) system.​
سؤال
What can be used to increase the strength of hashed passwords?​

A)​Salt
B)​Key stretching
C)​Double hashing
D)Crypting
سؤال
​Select below the decentralized open-source FIM that does not require specific software to be installed on the desktop:

A)​OAuth
B)​OpenID
C)​Windows Live ID
D)​OpenPass
سؤال
Passwords that are transmitted can be captured by what type of software?

A)application analyzer
B)system analyzer
C)function analyzer
D)protocol analyzer
سؤال
​What federated identity management (FIM) relies on token credentials?

A)​OAuth
B)​OpenID
C)​Windows Live
D)​OpenPass
سؤال
Passwords provide strong protection.
سؤال
A secret combination of letters, numbers, and/or characters that only the user should have knowledge of, is known as a:

A)token
B)password
C)biometric detail
D)challenge
سؤال
The use of one authentication credential to access multiple accounts or applications is referred to as?

A)Individual Sign On
B)Single Sign On
C)Unilateral Sign On
D)Federated Sign On
سؤال
​A list of the available nonkeyboard characters can be seen in Windows by opening what utility?

A)​charmap.exe
B)​charlist.exe
C)​chardump.exe
D)​listchar.exe
سؤال
Matching
a. Authentication factors
b. Bcrypt
c. Brute force attack
d. Dictionary attack
e. Hybrid attack
f. Key stretching
g. NTLM (New Technology LAN Manager) hash
h. Salt
i. Single sign-on
j. Token
A password hashing algorithm that requires significantly more time than standard hashing algorithms to create the digest.​
سؤال
​A U.S. Department of Defense (DoD) smart card that is used for identification of active-duty and reserve military personnel along with civilian employees and special contractors is called:

A)​Common Access Card (CAC)
B)​Identity Validation Card (IVC)
C)​Credential Validation Card (CVC)
D)​Personal Credential Card (PCC)
سؤال
Matching
a. Authentication factors
b. Bcrypt
c. Brute force attack
d. Dictionary attack
e. Hybrid attack
f. Key stretching
g. NTLM (New Technology LAN Manager) hash
h. Salt
i. Single sign-on
j. Token
​Five elements that can prove the genuineness of a user: what you know, what you have, what you are, what you do, and where you are.
سؤال
In most systems, a user logging in would be asked to ____________________ herself.
سؤال
____________________ is a decentralized open source FIM that does not require specific software to be installed on the desktop.
سؤال
A token ____________________ is a unique random string of characters that is encrypted to protect the token from being used by unauthorized parties.
سؤال
Matching
a. Authentication factors
b. Bcrypt
c. Brute force attack
d. Dictionary attack
e. Hybrid attack
f. Key stretching
g. NTLM (New Technology LAN Manager) hash
h. Salt
i. Single sign-on
j. Token
​A password attack that slightly alters dictionary words by adding numbers to the end of the password, spelling words backward, slightly misspelling words, or including special characters.
سؤال
The most common type of authentication today is a(n) ____________________.
سؤال
What technology allows users to share resources stored on one site with a second site without forwarding their authentication credentials to the other site?

A)OpenAuth
B)OAuth
C)SAML
D)Kerberos
سؤال
Matching
a. Authentication factors
b. Bcrypt
c. Brute force attack
d. Dictionary attack
e. Hybrid attack
f. Key stretching
g. NTLM (New Technology LAN Manager) hash
h. Salt
i. Single sign-on
j. Token
​A small device that can be affixed to a keychain with a window display that shows a code to be used for authentication.
سؤال
Matching
a. Authentication factors
b. Bcrypt
c. Brute force attack
d. Dictionary attack
e. Hybrid attack
f. Key stretching
g. NTLM (New Technology LAN Manager) hash
h. Salt
i. Single sign-on
j. Token
A popular key stretching password hash algorithm​
سؤال
Matching
a. Authentication factors
b. Bcrypt
c. Brute force attack
d. Dictionary attack
e. Hybrid attack
f. Key stretching
g. NTLM (New Technology LAN Manager) hash
h. Salt
i. Single sign-on
j. Token
​A random string that is used in hash algorithms.
سؤال
A(n) ____________________ attack begins with the attacker creating encrypted versions of common dictionary words, and then comparing them against those in a stolen password file.
سؤال
Matching
a. Authentication factors
b. Bcrypt
c. Brute force attack
d. Dictionary attack
e. Hybrid attack
f. Key stretching
g. NTLM (New Technology LAN Manager) hash
h. Salt
i. Single sign-on
j. Token
A password attack that creates encrypted versions of common dictionary words and compares them against those in a stolen password file.​
سؤال
What variation of a dictionary attack involves a dictionary attack combined with a brute force attack, and will slightly alter dictionary words by adding numbers to the end of the password, spelling words backward, slightly misspelling words, or including special characters?

A)brute force
B)hash replay
C)network replay
D)hybrid
سؤال
Matching
a. Authentication factors
b. Bcrypt
c. Brute force attack
d. Dictionary attack
e. Hybrid attack
f. Key stretching
g. NTLM (New Technology LAN Manager) hash
h. Salt
i. Single sign-on
j. Token
A password attack in which every possible combination of letters, numbers, and characters is used to create encrypted passwords that are matched against those in a stolen password file.​
سؤال
What kind of biometrics utilizes a person's unique physical characteristics for authentication, such as fingerprints or unique characteristics of a person's face?

A)Cognitive biometrics
B)Reactive biometrics
C)Standard biometrics
D)Affective biometrics
سؤال
Matching
a. Authentication factors
b. Bcrypt
c. Brute force attack
d. Dictionary attack
e. Hybrid attack
f. Key stretching
g. NTLM (New Technology LAN Manager) hash
h. Salt
i. Single sign-on
j. Token
Using one authentication credential to access multiple accounts or applications.​
سؤال
Matching
a. Authentication factors
b. Bcrypt
c. Brute force attack
d. Dictionary attack
e. Hybrid attack
f. Key stretching
g. NTLM (New Technology LAN Manager) hash
h. Salt
i. Single sign-on
j. Token
​A hash used by modern Microsoft Windows operating systems for creating password digests.
سؤال
Which term below describes the time it takes for a key to be pressed and then released?

A)Dwell time
B)Lead time
C)Sync time
D)Show time
سؤال
What are the three broad categories on which authentication can be based?
سؤال
Discuss the types of shortcuts that users take to help them recall their passwords.
سؤال
What is the difference between multifactor authentication and single-factor authentication?​
سؤال
What are the three advantages of a rainbow table over other password attacks?
سؤال
List and describe two of the common password setting objects.
سؤال
Describe how rainbow tables work.
سؤال
Why do passwords place a heavy load on human memory?
سؤال
Explain how an attacker can use a resetting attack.
سؤال
Discuss the weaknesses of OpenID.
سؤال
Explain why the LAN Manager (LM) hash is vulnerable.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/50
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 12: Authentication and Account Management
1
What type of attack involves an attacker stealing a file containing password digests and comparing the digests with digests created by the attacker?

A)offline cracking
B)online cracking
C)hash replay
D)token replay
A
2
What is the center of the weakness of passwords?

A)human memory
B)encryption technology
C)handshake technology
D)human reliability
A
3
​Which hashing algorithm below is used with NTLMv2's Hashed Message Authentication Code?

A)​SHA-1
B)​SHA-256
C)​MD4
D)​MD5
D
4
Geolocation is the identification of the location of a person or object using technology, and can be used as part of an authentication method.​
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
5
Using a rainbow table to crack a password requires three steps: Creation of the table, comparing the table to known hash values, and decrypting the password.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
6
​What type of one-time password (OTP) changes after a set time period?

A)​HMAC-Based one-time password (HOTP)
B)​Period-based one-time password (POTP)
C)​Time-based one-time password (TOTP)
D)​Interval-based one-time password (IOTP)
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
7
Which type of biometrics is based on the perception, thought process, and understanding of the user?

A)Standard biometrics
B)Reactive biometrics
C)Cognitive biometrics
D)Affective biometrics
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
8
What type of attack involves using every possible combination of letters, numbers, and characters to create candidate digests that are then matched against those in a stolen digest file?

A)Space division
B)Brute force
C)Known ciphertext
D)Known plaintext
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
9
Token credentials can be revoked at any time by the user without affecting other token credentials issued to other sites.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
10
The use of a single authentication credential that is shared across multiple networks is called:

A)Access management
B)Authorization management
C)Identity management
D)Risk management
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
11
The use of what item below involves the creation of a large pregenerated data set of candidate digests?

A)Rainbow tables
B)Randomized character list
C)Word list
D)Cascade tables
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
12
OpenID is an example of a web-based federated identity management (FIM) system.​
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
13
What can be used to increase the strength of hashed passwords?​

A)​Salt
B)​Key stretching
C)​Double hashing
D)Crypting
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
14
​Select below the decentralized open-source FIM that does not require specific software to be installed on the desktop:

A)​OAuth
B)​OpenID
C)​Windows Live ID
D)​OpenPass
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
15
Passwords that are transmitted can be captured by what type of software?

A)application analyzer
B)system analyzer
C)function analyzer
D)protocol analyzer
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
16
​What federated identity management (FIM) relies on token credentials?

A)​OAuth
B)​OpenID
C)​Windows Live
D)​OpenPass
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
17
Passwords provide strong protection.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
18
A secret combination of letters, numbers, and/or characters that only the user should have knowledge of, is known as a:

A)token
B)password
C)biometric detail
D)challenge
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
19
The use of one authentication credential to access multiple accounts or applications is referred to as?

A)Individual Sign On
B)Single Sign On
C)Unilateral Sign On
D)Federated Sign On
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
20
​A list of the available nonkeyboard characters can be seen in Windows by opening what utility?

A)​charmap.exe
B)​charlist.exe
C)​chardump.exe
D)​listchar.exe
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
21
Matching
a. Authentication factors
b. Bcrypt
c. Brute force attack
d. Dictionary attack
e. Hybrid attack
f. Key stretching
g. NTLM (New Technology LAN Manager) hash
h. Salt
i. Single sign-on
j. Token
A password hashing algorithm that requires significantly more time than standard hashing algorithms to create the digest.​
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
22
​A U.S. Department of Defense (DoD) smart card that is used for identification of active-duty and reserve military personnel along with civilian employees and special contractors is called:

A)​Common Access Card (CAC)
B)​Identity Validation Card (IVC)
C)​Credential Validation Card (CVC)
D)​Personal Credential Card (PCC)
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
23
Matching
a. Authentication factors
b. Bcrypt
c. Brute force attack
d. Dictionary attack
e. Hybrid attack
f. Key stretching
g. NTLM (New Technology LAN Manager) hash
h. Salt
i. Single sign-on
j. Token
​Five elements that can prove the genuineness of a user: what you know, what you have, what you are, what you do, and where you are.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
24
In most systems, a user logging in would be asked to ____________________ herself.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
25
____________________ is a decentralized open source FIM that does not require specific software to be installed on the desktop.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
26
A token ____________________ is a unique random string of characters that is encrypted to protect the token from being used by unauthorized parties.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
27
Matching
a. Authentication factors
b. Bcrypt
c. Brute force attack
d. Dictionary attack
e. Hybrid attack
f. Key stretching
g. NTLM (New Technology LAN Manager) hash
h. Salt
i. Single sign-on
j. Token
​A password attack that slightly alters dictionary words by adding numbers to the end of the password, spelling words backward, slightly misspelling words, or including special characters.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
28
The most common type of authentication today is a(n) ____________________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
29
What technology allows users to share resources stored on one site with a second site without forwarding their authentication credentials to the other site?

A)OpenAuth
B)OAuth
C)SAML
D)Kerberos
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
30
Matching
a. Authentication factors
b. Bcrypt
c. Brute force attack
d. Dictionary attack
e. Hybrid attack
f. Key stretching
g. NTLM (New Technology LAN Manager) hash
h. Salt
i. Single sign-on
j. Token
​A small device that can be affixed to a keychain with a window display that shows a code to be used for authentication.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
31
Matching
a. Authentication factors
b. Bcrypt
c. Brute force attack
d. Dictionary attack
e. Hybrid attack
f. Key stretching
g. NTLM (New Technology LAN Manager) hash
h. Salt
i. Single sign-on
j. Token
A popular key stretching password hash algorithm​
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
32
Matching
a. Authentication factors
b. Bcrypt
c. Brute force attack
d. Dictionary attack
e. Hybrid attack
f. Key stretching
g. NTLM (New Technology LAN Manager) hash
h. Salt
i. Single sign-on
j. Token
​A random string that is used in hash algorithms.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
33
A(n) ____________________ attack begins with the attacker creating encrypted versions of common dictionary words, and then comparing them against those in a stolen password file.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
34
Matching
a. Authentication factors
b. Bcrypt
c. Brute force attack
d. Dictionary attack
e. Hybrid attack
f. Key stretching
g. NTLM (New Technology LAN Manager) hash
h. Salt
i. Single sign-on
j. Token
A password attack that creates encrypted versions of common dictionary words and compares them against those in a stolen password file.​
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
35
What variation of a dictionary attack involves a dictionary attack combined with a brute force attack, and will slightly alter dictionary words by adding numbers to the end of the password, spelling words backward, slightly misspelling words, or including special characters?

A)brute force
B)hash replay
C)network replay
D)hybrid
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
36
Matching
a. Authentication factors
b. Bcrypt
c. Brute force attack
d. Dictionary attack
e. Hybrid attack
f. Key stretching
g. NTLM (New Technology LAN Manager) hash
h. Salt
i. Single sign-on
j. Token
A password attack in which every possible combination of letters, numbers, and characters is used to create encrypted passwords that are matched against those in a stolen password file.​
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
37
What kind of biometrics utilizes a person's unique physical characteristics for authentication, such as fingerprints or unique characteristics of a person's face?

A)Cognitive biometrics
B)Reactive biometrics
C)Standard biometrics
D)Affective biometrics
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
38
Matching
a. Authentication factors
b. Bcrypt
c. Brute force attack
d. Dictionary attack
e. Hybrid attack
f. Key stretching
g. NTLM (New Technology LAN Manager) hash
h. Salt
i. Single sign-on
j. Token
Using one authentication credential to access multiple accounts or applications.​
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
39
Matching
a. Authentication factors
b. Bcrypt
c. Brute force attack
d. Dictionary attack
e. Hybrid attack
f. Key stretching
g. NTLM (New Technology LAN Manager) hash
h. Salt
i. Single sign-on
j. Token
​A hash used by modern Microsoft Windows operating systems for creating password digests.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
40
Which term below describes the time it takes for a key to be pressed and then released?

A)Dwell time
B)Lead time
C)Sync time
D)Show time
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
41
What are the three broad categories on which authentication can be based?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
42
Discuss the types of shortcuts that users take to help them recall their passwords.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
43
What is the difference between multifactor authentication and single-factor authentication?​
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
44
What are the three advantages of a rainbow table over other password attacks?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
45
List and describe two of the common password setting objects.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
46
Describe how rainbow tables work.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
47
Why do passwords place a heavy load on human memory?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
48
Explain how an attacker can use a resetting attack.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
49
Discuss the weaknesses of OpenID.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
50
Explain why the LAN Manager (LM) hash is vulnerable.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.