Filters
Question type

Study Flashcards

Enrollment creates an association between a user and the user'sbiometric characteristics.

A) True
B) False

Correct Answer

verifed

verified

A __________ strategy is one in which the system periodically runs its own password cracker to find guessable passwords.


A) user education
B) proactive password checking
C) reactive password checking
D) computer-generated password

E) B) and D)
F) A) and B)

Correct Answer

verifed

verified

User authentication is a procedure that allows communicating parties toverify that the contents of a received message have not been altered and that the source is authentic.

A) True
B) False

Correct Answer

verifed

verified

Each individual who is to be included in the database of authorized users must first be __________ in the system.


A) verified
B) authenticated
C) identified
D) enrolled

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Identification is the means of establishing the validity of a claimedidentity provided by a user.

A) True
B) False

Correct Answer

verifed

verified

An institution that issues debit cards to cardholders and is responsible for the cardholder's account and authorizing transactions is the _________.


A) cardholder
B) auditor
C) issuer
D) processor

E) A) and C)
F) C) and D)

Correct Answer

verifed

verified

An authentication process consists of the _________ step and the verification step.

Correct Answer

verifed

verified

A smart card contains an entire microprocessor.

A) True
B) False

Correct Answer

verifed

verified

In a __________ attack, an application or physical device masquerades as an authentic application or device for the purpose of capturing a user password, passcode, or biometric.

Correct Answer

verifed

verified

The technique for developing an effective and efficient proactive password checker based on rejecting words on a list is based on the use of a __________ filter.

Correct Answer

verifed

verified

Bloom

A __________ attack involves an adversary repeating a previously captured user response.


A) client
B) replay
C) Trojan horse
D) eavesdropping

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

A __________ is a separate file from the user IDs where hashed passwords are kept.

Correct Answer

verifed

verified

shadow pas...

View Answer

A __________ is directed at the user file at the host where passwords, token passcodes, or biometric templates are stored.


A) eavesdropping attack
B) denial-of-service attack
C) client attack
D) host attack

E) A) and B)
F) C) and D)

Correct Answer

verifed

verified

Memory cards store and process data.

A) True
B) False

Correct Answer

verifed

verified

__________ defines user authentication as "the process of verifying an identity claimed by or for a system entity".


A) RFC 4949
B) RFC 2298
C) RFC 2493
D) RFC 2328

E) A) and D)
F) None of the above

Correct Answer

verifed

verified

A __________ is a password guessing program.


A) password hash
B) password cracker
C) password biometric
D) password salt

E) B) and D)
F) B) and C)

Correct Answer

verifed

verified

B

User authentication is the basis for most types of access control and foruser accountability.

A) True
B) False

Correct Answer

verifed

verified

Identifiers should be assigned carefully because authenticatedidentities are the basis for other security services.

A) True
B) False

Correct Answer

verifed

verified

User authentication is the fundamental building block and the primaryline of defense.

A) True
B) False

Correct Answer

verifed

verified

True

Voice pattern, handwriting characteristics, and typing rhythm are examples of __________ biometrics.

Correct Answer

verifed

verified

Showing 1 - 20 of 45

Related Exams

Show Answer