Week 3
40 Questions
1 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the difference between identification and authentication?

  • Identification verifies the user's identity, while authentication provides a proven assertion of identity. (correct)
  • Identification and authentication are the same concepts.
  • Identification checks the credentials, while authentication relies on biometric factors.
  • Identification provides a proven assertion of identity, while authentication verifies the user's identity.

Which of the following is an example of biometric authentication?

  • Fingerprint scan (correct)
  • Knowledge-based questions
  • Username and password combination
  • Possession of an access card

What does multi-factor authentication rely on?

  • At least two factors: knowledge-based, possession-based, or entity-based (correct)
  • At least three factors: possession-based, entity-based, and biometric
  • Single factor only
  • Biometric factor only

In terms of access controls, what does Single Sign-On (SSO) provide?

<p>Centralized identity for multiple applications with session management (B)</p> Signup and view all the answers

Which of the following is not an authentication standard mentioned in the text?

<p>IMAP (C)</p> Signup and view all the answers

What is the main advantage of Single Sign-On (SSO) in identity management?

<p>Allows authentication once to access multiple systems (D)</p> Signup and view all the answers

Which authentication weakness arises if an intruder compromises a password in a Single Sign-On (SSO) environment?

<p>Access to all participating systems (C)</p> Signup and view all the answers

What technology is NOT typically used for centralized management of access controls?

<p>Two-factor authentication (B)</p> Signup and view all the answers

Which of the following is not a common issue related to password management?

<p>Single Sign-On integration (A)</p> Signup and view all the answers

What is a potential drawback of Single Sign-On (SSO) implementation in practice?

<p>It may be harder to achieve in practice due to integration issues (C)</p> Signup and view all the answers

Which authentication method relies on something the user has?

<p>Fingerprint (C)</p> Signup and view all the answers

What type of assertion of identity is authentication?

<p>Proven assertion (D)</p> Signup and view all the answers

Which factor of authentication does a token fall under?

<p>Something the user has (B)</p> Signup and view all the answers

What does multi-factor authentication typically combine?

<p>Various types of authentication factors (B)</p> Signup and view all the answers

Which standard is commonly associated with biometric authentication implementation?

<p>Biometric Identification Protocol (A)</p> Signup and view all the answers

What is a common weakness of traditional userid + password authentication?

<p>Easily guessed passwords (C)</p> Signup and view all the answers

Which of the following is an example of multi-factor authentication?

<p>Iris scan (C)</p> Signup and view all the answers

What makes biometric authentication stronger than traditional userid + password authentication?

<p>Measures a part of user's body (B)</p> Signup and view all the answers

Which type of authentication requires what the user knows and has?

<p>Token-based authentication (B)</p> Signup and view all the answers

What is the purpose of multi-factor authentication in defeating password guessing/cracking?

<p>To ensure the user has a second factor besides a password (C)</p> Signup and view all the answers

What is the purpose of hashing a user's password in the authentication process?

<p>To compare the hash with the stored hash for user authentication (C)</p> Signup and view all the answers

Why is it recommended to store user passwords encrypted or hashed in a system?

<p>To prevent unauthorized access to user passwords (D)</p> Signup and view all the answers

What security measure should be implemented for better protection against rainbow table attacks when storing passwords?

<p>Using 'salting' in password hashing (D)</p> Signup and view all the answers

How does multi-factor authentication differ from traditional username and password authentication?

<p>Multi-factor authentication requires multiple forms of verification (A)</p> Signup and view all the answers

In which scenario would using biometric authentication be most appropriate?

<p>High-security facilities where physical access is restricted (B)</p> Signup and view all the answers

What is the main weakness associated with Reduced Sign-On compared to Single Sign-On (SSO)?

<p>No inter-system session management (A)</p> Signup and view all the answers

Why is it recommended to combine Reduced Sign-On with two-factor authentication?

<p>To enhance security by adding an extra layer beyond passwords (D)</p> Signup and view all the answers

What is a common issue that arises when access rights are not properly managed during internal transfers?

<p>Accumulation of privileges (D)</p> Signup and view all the answers

Which of the following is a key step in the Access Requests and Provisioning process?

<p>Conducting a periodic access review (D)</p> Signup and view all the answers

Why is two-factor authentication considered more secure than single-factor authentication?

<p>It combines two different forms of identification (C)</p> Signup and view all the answers

Which type of attack method involves attempting to interfere with or gain control of a system using malicious code?

<p>Buffer overflow (C)</p> Signup and view all the answers

What process includes activities such as access requests, internal transfers, terminations, periodic reviews, and audits?

<p>Access management (B)</p> Signup and view all the answers

Which type of control aims to protect assets using various layers of security measures?

<p>Defense in depth control (D)</p> Signup and view all the answers

What kind of testing is used to evaluate access controls through the examination of system vulnerabilities?

<p>Application vulnerability testing (C)</p> Signup and view all the answers

Which method of attack aims to deceive individuals into disclosing sensitive information?

<p>Phishing (B)</p> Signup and view all the answers

What principle advocates limiting user access rights to only what is essential for performing job functions?

<p>Least privilege (D)</p> Signup and view all the answers

Which type of control is used to identify and respond to security incidents after they have occurred?

<p>Corrective control (D)</p> Signup and view all the answers

What mechanism is employed to verify an individual's claimed identity using unique biological traits?

<p>Biometric authentication (A)</p> Signup and view all the answers

'Separation of duties' in access controls refers to:

<p>Dividing tasks between different employees (B)</p> Signup and view all the answers

Which type of authentication involves providing something you have (like an ID card) and something you know (like a password)?

<p>Multi-factor authentication (B)</p> Signup and view all the answers

More Like This

Use Quizgecko on...
Browser
Browser