MCQGeeks
0 : 0 : 1
CBSE
JEE
NTSE
NEET
English
UK Quiz
Quiz
Driving Test
Practice
Games
Practice
Week 12 Quiz
«
Multiple Choice Questions
»
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
What kind of biometrics utilizes a person's unique physical characteristics for authentication, such as fingerprints or unique characteristics of a person's face?
0%
HMAC-Based one-time password (HOTP)
0%
Standard biometrics
0%
Identity management
0%
Cognitive biometrics
Which term below describes the time it takes for a key to be pressed and then released?
0%
Dwell time
0%
Rainbow tables
0%
charmap.exe
0%
Cognitive biometrics
Select below the decentralized open-source FIM that does not require specific software to be installed on the desktop:
0%
True
0%
OAuth
0%
OpenID
0%
password
Which type of biometrics is based on the perception, thought process, and understanding of the user?
0%
Dwell time
0%
Standard biometrics
0%
Identity management
0%
Cognitive biometrics
What can be used to increase the strength of hashed passwords?
0%
Salt
0%
False
0%
True
0%
OAuth
The use of a single authentication credential that is shared across multiple networks is called:
0%
Single Sign On
0%
Rainbow tables
0%
Identity management
0%
Cognitive biometrics
Which hashing algorithm below is used with NTLMv2's Hashed Message Authentication Code?
0%
Salt
0%
MD5
0%
Dwell time
0%
True
What is the center of the weakness of passwords?
0%
charmap.exe
0%
human memory
0%
HMAC-Based one-time password (HOTP)
0%
Dwell time
What type of attack involves using every possible combination of letters, numbers, and characters to create candidate digests that are then matched against those in a stolen digest file?
0%
Standard biometrics
0%
Brute force
0%
offline cracking
0%
hybrid
Passwords that are transmitted can be captured by what type of software?
0%
charmap.exe
0%
Identity management
0%
Rainbow tables
0%
protocol analyzer
A U.S. Department of Defense (DoD) smart card that is used for identification of active-duty and reserve military personnel along with civilian employees and special contractors is called:
0%
Common Access Card (CAC)
0%
Cognitive biometrics
0%
Standard biometrics
0%
Rainbow tables
The use of one authentication credential to access multiple accounts or applications is referred to as?
0%
charmap.exe
0%
Identity management
0%
Single Sign On
0%
Rainbow tables
A secret combination of letters, numbers, and/or characters that only the user should have knowledge of, is known as a:
0%
OpenID
0%
password
0%
charmap.exe
0%
False
Token credentials can be revoked at any time by the user without affecting other token credentials issued to other sites.
0%
True
0%
False
The use of what item below involves the creation of a large pregenerated data set of candidate digests?
0%
Single Sign On
0%
charmap.exe
0%
Identity management
0%
Rainbow tables
0 h : 0 m : 1 s
«
Multiple Choice Questions
»
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
0
Answered
0
Not Answered
0
Not Visited
Correct : 0
Incorrect : 0
Report Question
×
What's an issue?
Question is wrong
Answer is wrong
Other Reason
Want to elaborate a bit more? (optional)
Support mcqgeeks.com by disabling your adblocker.
×
Please disable the adBlock and continue.
Thank you.
Reload page