Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Computing
Study Set
Computer Security Principles and Practice
Quiz 3: User Authentication
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 21
Multiple Choice
A __________ is directed at the user file at the host where passwords,token passcodes,or biometric templates are stored.
Question 22
Multiple Choice
A __________ attack involves an adversary repeating a previously captured user response.
Question 23
Short Answer
A __________ is a separate file from the user IDs where hashed passwords are kept.
Question 24
Short Answer
Authentication protocols used with smart tokens can be classified into three categories: static,dynamic password generator,and ___________.
Question 25
Short Answer
A host generated random number is often called a __________.
Question 26
Short Answer
Voice pattern,handwriting characteristics,and typing rhythm are examples of __________ biometrics.
Question 27
Short Answer
Objects that a user possesses for the purpose of user authentication are called ______.
Question 28
Short Answer
The technique for developing an effective and efficient proactive password checker based on rejecting words on a list is based on the use of a __________ filter.
Question 29
Multiple Choice
To counter threats to remote user authentication,systems generally rely on some form of ___________ protocol.
Question 30
Short Answer
With the __________ strategy a user is allowed to select their own password,but the system checks to see if the password is allowable.
Question 31
Multiple Choice
An institution that issues debit cards to cardholders and is responsible for the cardholder's account and authorizing transactions is the _________.
Question 32
Short Answer
The __________ is the pattern formed by veins beneath the retinal surface.
Question 33
Multiple Choice
__________ allows an issuer to access regional and national networks that connect point of sale devices and bank teller machines worldwide.
Question 34
Short Answer
A __________ authentication system attempts to authenticate an individual based on his or her unique physical characteristics.
Question 35
Multiple Choice
Each individual who is to be included in the database of authorized users must first be __________ in the system.
Question 36
Multiple Choice
__________ systems identify features of the hand,including shape,and lengths and widths of fingers.
Question 37
Short Answer
An authentication process consists of the _________ step and the verification step.
Question 38
Short Answer
__________,in the context of passwords,refers to an adversary's attempt to learn the password by observing the user,finding a written copy of the password,or some similar attack that involves the physical proximity of user and adversary.