Deck 3: User Authentication

Full screen (f)
exit full mode
Question
The __________ strategy is when users are told the importance of using hard to guess passwords and provided with guidelines for selecting strong passwords.

A)reactive password checking
B)computer-generated password
C)proactive password checking
D)user education
Use Space or
up arrow
down arrow
to flip the card.
Question
In a biometric scheme some physical characteristic of the individual is
mapped into a digital representation.
Question
__________ defines user authentication as "the process of verifying an identity claimed by or for a system entity".

A)RFC 2828
B)RFC 2493
C)RFC 2298
D)RFC 2328
Question
Depending on the application,user authentication on a biometric
system involves either verification or identification.
Question
Identifiers should be assigned carefully because authenticated
identities are the basis for other security services.
Question
Keylogging is a form of host attack.
Question
A __________ strategy is one in which the system periodically runs its own password cracker to find guessable passwords.

A)user education
B)reactive password checking
C)proactive password checking
D)computer-generated password
Question
A __________ is a password guessing program.

A)password hash
B)password biometric
C)password cracker
D)password salt
Question
A smart card contains an entire microprocessor.
Question
Identification is the means of establishing the validity of a claimed
identity provided by a user.
Question
Memory cards store and process data.
Question
Presenting or generating authentication information that corroborates the binding between the entity and the identifier is the ___________.

A)identification step
B)authentication step
C)verification step
D)corroboration step
Question
An individual's signature is not unique enough to use in biometric
applications.
Question
Recognition by fingerprint,retina,and face are examples of __________.

A)face recognition
B)static biometrics
C)dynamic biometrics
D)token authentication
Question
User authentication is the fundamental building block and the primary
line of defense.
Question
User authentication is a procedure that allows communicating parties to
verify that the contents of a received message have not been altered and that the source is authentic.
Question
Enrollment creates an association between a user and the user's
biometric characteristics.
Question
A good technique for choosing a password is to use the first letter of
each word of a phrase.
Question
A token is the best means of authentication because it cannot be forged
or stolen by an adversary.
Question
User authentication is the basis for most types of access control and for
user accountability.
Question
A __________ is directed at the user file at the host where passwords,token passcodes,or biometric templates are stored.

A)eavesdropping attack
B)client attack
C)denial-of-service attack
D)host attack
Question
A __________ attack involves an adversary repeating a previously captured user response.

A)client
B)Trojan horse
C)replay
D)eavesdropping
Question
A __________ is a separate file from the user IDs where hashed passwords are kept.
Question
Authentication protocols used with smart tokens can be classified into three categories: static,dynamic password generator,and ___________.
Question
A host generated random number is often called a __________.
Question
Voice pattern,handwriting characteristics,and typing rhythm are examples of __________ biometrics.
Question
Objects that a user possesses for the purpose of user authentication are called ______.
Question
The technique for developing an effective and efficient proactive password checker based on rejecting words on a list is based on the use of a __________ filter.
Question
To counter threats to remote user authentication,systems generally rely on some form of ___________ protocol.

A)eavesdropping
B)challenge-response
C)Trojan horse
D)denial-of-service
Question
With the __________ strategy a user is allowed to select their own password,but the system checks to see if the password is allowable.
Question
An institution that issues debit cards to cardholders and is responsible for the cardholder's account and authorizing transactions is the _________.

A)cardholder
B)issuer
C)auditor
D)processor
Question
The __________ is the pattern formed by veins beneath the retinal surface.
Question
__________ allows an issuer to access regional and national networks that connect point of sale devices and bank teller machines worldwide.

A)EFT
B)ATM
C)POS
D)ALF
Question
A __________ authentication system attempts to authenticate an individual based on his or her unique physical characteristics.
Question
Each individual who is to be included in the database of authorized users must first be __________ in the system.

A)verified
B)identified
C)authenticated
D)enrolled
Question
__________ systems identify features of the hand,including shape,and lengths and widths of fingers.

A)Signature
B)Fingerprint
C)Hand geometry
D)Palm print
Question
An authentication process consists of the _________ step and the verification step.
Question
__________,in the context of passwords,refers to an adversary's attempt to learn the password by observing the user,finding a written copy of the password,or some similar attack that involves the physical proximity of user and adversary.
Question
A __________ is when an adversary attempts to achieve user authentication without access to the remote host or to the intervening communications path.

A)client attack
B)host attack
C)eavesdropping attack
D)Trojan horse attack
Question
The most common means of human-to-human identification are __________.

A)facial characteristics
B)retinal patterns
C)signatures
D)fingerprints
Question
A __________ attack attempts to disable a user authentication service by flooding the service with numerous authentication attempts.
Question
The __________ step is presenting or generating authentication information that corroborates the binding between the entity and the identifier.
Question
A __________ is an individual to whom a debit card is issued.
Question
In a __________ attack,an application or physical device masquerades as an authentic application or device for the purpose of capturing a user password,passcode,or biometric.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/44
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 3: User Authentication
1
The __________ strategy is when users are told the importance of using hard to guess passwords and provided with guidelines for selecting strong passwords.

A)reactive password checking
B)computer-generated password
C)proactive password checking
D)user education
D
2
In a biometric scheme some physical characteristic of the individual is
mapped into a digital representation.
True
3
__________ defines user authentication as "the process of verifying an identity claimed by or for a system entity".

A)RFC 2828
B)RFC 2493
C)RFC 2298
D)RFC 2328
A
4
Depending on the application,user authentication on a biometric
system involves either verification or identification.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
5
Identifiers should be assigned carefully because authenticated
identities are the basis for other security services.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
6
Keylogging is a form of host attack.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
7
A __________ strategy is one in which the system periodically runs its own password cracker to find guessable passwords.

A)user education
B)reactive password checking
C)proactive password checking
D)computer-generated password
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
8
A __________ is a password guessing program.

A)password hash
B)password biometric
C)password cracker
D)password salt
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
9
A smart card contains an entire microprocessor.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
10
Identification is the means of establishing the validity of a claimed
identity provided by a user.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
11
Memory cards store and process data.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
12
Presenting or generating authentication information that corroborates the binding between the entity and the identifier is the ___________.

A)identification step
B)authentication step
C)verification step
D)corroboration step
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
13
An individual's signature is not unique enough to use in biometric
applications.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
14
Recognition by fingerprint,retina,and face are examples of __________.

A)face recognition
B)static biometrics
C)dynamic biometrics
D)token authentication
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
15
User authentication is the fundamental building block and the primary
line of defense.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
16
User authentication is a procedure that allows communicating parties to
verify that the contents of a received message have not been altered and that the source is authentic.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
17
Enrollment creates an association between a user and the user's
biometric characteristics.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
18
A good technique for choosing a password is to use the first letter of
each word of a phrase.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
19
A token is the best means of authentication because it cannot be forged
or stolen by an adversary.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
20
User authentication is the basis for most types of access control and for
user accountability.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
21
A __________ is directed at the user file at the host where passwords,token passcodes,or biometric templates are stored.

A)eavesdropping attack
B)client attack
C)denial-of-service attack
D)host attack
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
22
A __________ attack involves an adversary repeating a previously captured user response.

A)client
B)Trojan horse
C)replay
D)eavesdropping
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
23
A __________ is a separate file from the user IDs where hashed passwords are kept.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
24
Authentication protocols used with smart tokens can be classified into three categories: static,dynamic password generator,and ___________.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
25
A host generated random number is often called a __________.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
26
Voice pattern,handwriting characteristics,and typing rhythm are examples of __________ biometrics.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
27
Objects that a user possesses for the purpose of user authentication are called ______.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
28
The technique for developing an effective and efficient proactive password checker based on rejecting words on a list is based on the use of a __________ filter.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
29
To counter threats to remote user authentication,systems generally rely on some form of ___________ protocol.

A)eavesdropping
B)challenge-response
C)Trojan horse
D)denial-of-service
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
30
With the __________ strategy a user is allowed to select their own password,but the system checks to see if the password is allowable.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
31
An institution that issues debit cards to cardholders and is responsible for the cardholder's account and authorizing transactions is the _________.

A)cardholder
B)issuer
C)auditor
D)processor
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
32
The __________ is the pattern formed by veins beneath the retinal surface.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
33
__________ allows an issuer to access regional and national networks that connect point of sale devices and bank teller machines worldwide.

A)EFT
B)ATM
C)POS
D)ALF
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
34
A __________ authentication system attempts to authenticate an individual based on his or her unique physical characteristics.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
35
Each individual who is to be included in the database of authorized users must first be __________ in the system.

A)verified
B)identified
C)authenticated
D)enrolled
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
36
__________ systems identify features of the hand,including shape,and lengths and widths of fingers.

A)Signature
B)Fingerprint
C)Hand geometry
D)Palm print
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
37
An authentication process consists of the _________ step and the verification step.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
38
__________,in the context of passwords,refers to an adversary's attempt to learn the password by observing the user,finding a written copy of the password,or some similar attack that involves the physical proximity of user and adversary.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
39
A __________ is when an adversary attempts to achieve user authentication without access to the remote host or to the intervening communications path.

A)client attack
B)host attack
C)eavesdropping attack
D)Trojan horse attack
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
40
The most common means of human-to-human identification are __________.

A)facial characteristics
B)retinal patterns
C)signatures
D)fingerprints
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
41
A __________ attack attempts to disable a user authentication service by flooding the service with numerous authentication attempts.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
42
The __________ step is presenting or generating authentication information that corroborates the binding between the entity and the identifier.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
43
A __________ is an individual to whom a debit card is issued.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
44
In a __________ attack,an application or physical device masquerades as an authentic application or device for the purpose of capturing a user password,passcode,or biometric.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 44 flashcards in this deck.