CR2441 - Chapter 11

A vibrant illustration showcasing various authentication methods including biometrics, passwords, and security tokens, in a digital environment.

Authentication and Security Quiz

Test your knowledge on authentication factors, password security, and biometric identification with our engaging quiz. Designed for learners and professionals alike, this quiz covers essential concepts in cybersecurity.

  • 20 multiple-choice questions
  • Topics on passwords, biometrics, and authentication systems
  • Great for self-assessment and learning
20 Questions5 MinutesCreated by SecureGuard256
Which authentication factor is based on a unique talent that a user possesses?
What you have
What you are
What you do
What you know
Which of these is NOT a characteristic of a weak password?
A common dictionary word
A long password
Using personal information
Using a predictable sequence of characters
Each of the following accounts should be prohibited EXCEPT:
Shared accounts
Generic accounts
Privileged accounts
Guest accounts
Ilya has been asked to recommend a federation system technology that is an open-source federation framework that can support the development of authorization protocols. Which of these technologies would he recommend?
OAuth
Open ID Connect
Shibboleth
NTLM
How is key stretching effective in resisting password attacks?
It takes more time to generate candidate password digests.
It requires the use of GPUs.
It does not require the use of salts.
The license fees are very expensive to purchase and use it.
Which of these is NOT a reason why users create weak passwords?
A lengthy and complex password can be difficult to memorize.
A security policy requires a password to be changed regularly.
Having multiple passwords makes it hard to remember all of them.
Most sites force users to create weak passwords even though they do not want to.
What is a hybrid attack?
An attack that uses both automated and user input
An attack that combines a dictionary attack with a mask attack
A brute force attack that uses special tables
An attack that slightly alters dictionary words
A TOTP token code is generally valid for what period of time?
Only while the user presses SEND
For as long as it appears on the device
For up to 24 hours
Until an event occurs
What is a token system that requires the user to enter the code along with a PIN called?
Single-factor authentication system
Token-passing authentication system
Dual-prong verification system
Multifactor authentication system
Which of these is a U.S. Department of Defense (DoD) smart card that is used for identification of active-duty and reserve military personnel?
Personal Identity Verification (PIV) card
Secure ID Card (SIDC)
Common Access Card (CAC)
Government Smart Card (GSC)
Which of the following should NOT be stored in a secure password database?
Iterations
Password digest
Salt
Plaintext password
Creating a pattern of where a user accesses a remote web account is an example of which of the following?
Keystroke dynamics
Geolocation
Time-Location Resource Monitoring (TLRM)
Cognitive biometrics
Timur was making a presentation regarding how attackers break passwords. His presentation demonstrated the attack technique that is the slowest yet most thorough attack that is used against passwords. Which of these password attacks did he demonstrate?
Dictionary attack
Hybrid attack
Custom attack
Brute force attack
Which human characteristic is NOT used for biometric identification?
Retina
Iris
Height
Fingerprint
Biometrics is related to the perception, thought processes, and understanding of the user.
Cognitive
Standard
Intelligent
Behavioral
Using one authentication credential to access multiple accounts or applications is known as .
Single sign-on
Credentialization
Identification authentication
Federal login
What is a disadvantage of biometric readers?
Speed
Cost
Weight
Standards
Which type of password attack is a more targeted brute force attack that uses placeholders for characters in certain positions of the password?
Rainbow attack
Mask attack
Rule attack
Pass the hash attack
Why should the account lockout threshold not be set too low?
It could decrease calls to the help desk.
The network administrator would have to reset the account manually.
The user would not have to wait too long to have her password reset.
It could result in denial of service (DoS) attacks.
Which one-time password is event-driven?
HOTP
TOTP
ROTP
POTP
{"name":"CR2441 - Chapter 11", "url":"https://www.quiz-maker.com/QPREVIEW","txt":"Test your knowledge on authentication factors, password security, and biometric identification with our engaging quiz. Designed for learners and professionals alike, this quiz covers essential concepts in cybersecurity.20 multiple-choice questionsTopics on passwords, biometrics, and authentication systemsGreat for self-assessment and learning","img":"https:/images/course8.png"}
Powered by: Quiz Maker