What kind of biometrics utilizes a person's unique physical characteristics for authentication, such as fingerprints or unique characteristics of a person's face?
  • HMAC-Based one-time password (HOTP)
  • Standard biometrics
  • Identity management
  • Cognitive biometrics
Which term below describes the time it takes for a key to be pressed and then released?
  • Dwell time
  • Rainbow tables
  • ​charmap.exe
  • Cognitive biometrics
Select below the decentralized open-source FIM that does not require specific software to be installed on the desktop:
  • True
  • OAuth
  • OpenID
  • password
Which type of biometrics is based on the perception, thought process, and understanding of the user?
  • Dwell time
  • Standard biometrics
  • Identity management
  • Cognitive biometrics
What can be used to increase the strength of hashed passwords?​
  • Salt
  • False
  • True
  • OAuth
The use of a single authentication credential that is shared across multiple networks is called:
  • Single Sign On
  • Rainbow tables
  • Identity management
  • Cognitive biometrics
Which hashing algorithm below is used with NTLMv2's Hashed Message Authentication Code?
  • Salt
  • MD5
  • Dwell time
  • True
What is the center of the weakness of passwords?
  • ​charmap.exe
  • human memory
  • HMAC-Based one-time password (HOTP)
  • Dwell time
What type of attack involves using every possible combination of letters, numbers, and characters to create candidate digests that are then matched against those in a stolen digest file?
  • Standard biometrics
  • Brute force
  • offline cracking
  • hybrid
Passwords that are transmitted can be captured by what type of software?
  • ​charmap.exe
  • Identity management
  • Rainbow tables
  • protocol analyzer
​A U.S. Department of Defense (DoD) smart card that is used for identification of active-duty and reserve military personnel along with civilian employees and special contractors is called:
  • Common Access Card (CAC)
  • Cognitive biometrics
  • Standard biometrics
  • Rainbow tables
The use of one authentication credential to access multiple accounts or applications is referred to as?
  • ​charmap.exe
  • Identity management
  • Single Sign On
  • Rainbow tables
A secret combination of letters, numbers, and/or characters that only the user should have knowledge of, is known as a:
  • OpenID
  • password
  • ​charmap.exe
  • False
Token credentials can be revoked at any time by the user without affecting other token credentials issued to other sites.
  • True
  • False
The use of what item below involves the creation of a large pregenerated data set of candidate digests?
  • Single Sign On
  • ​charmap.exe
  • Identity management
  • Rainbow tables
0 h : 0 m : 1 s

Answered Not Answered Not Visited Correct : 0 Incorrect : 0