Cybersecurity Fundamentals Chapter 3
42 Questions
0 Views

Cybersecurity Fundamentals Chapter 3

Created by
@RecommendedAmber

Questions and Answers

What is the primary purpose of allowing temporary password use for system logons?

  • To improve system security permanently
  • To enhance user experience
  • To facilitate immediate change to a permanent password (correct)
  • To simplify the authentication process
  • Which of the following is classified as a dynamic biometric authentication method?

  • Face recognition
  • Voice pattern (correct)
  • Retina scan
  • Fingerprint
  • What does multifactor authentication (MFA) require from a user?

  • Only possession of a token
  • One piece of evidence for verification
  • A password shared with the system admin
  • Two or more pieces of evidence for verification (correct)
  • Which level of Identity Assurance Level (IAL) requires physical presence for identity proofing?

    <p>IAL3</p> Signup and view all the answers

    What type of passwords should be stored and transmitted according to best practices?

    <p>Cryptographically-protected passwords</p> Signup and view all the answers

    Which of the following is NOT a mean of authenticating a user's identity?

    <p>Something the individual imagines</p> Signup and view all the answers

    At which Authenticator Assurance Level (AAL) is some assurance of authentication provided via user-supplied ID and password?

    <p>AAL1</p> Signup and view all the answers

    Which of the following best describes static biometrics?

    <p>Physical features verified at one time</p> Signup and view all the answers

    What is digital identity defined as?

    <p>A unique representation of a subject engaged in an online transaction.</p> Signup and view all the answers

    Which of the following is a basic security requirement for user authentication?

    <p>Authenticate the identities of users, processes, or devices.</p> Signup and view all the answers

    What is multifactor authentication primarily used for?

    <p>To enhance access control for privileged accounts.</p> Signup and view all the answers

    Which security measure is intended to prevent the reuse of identifiers?

    <p>Defining a period during which identifiers cannot be reused.</p> Signup and view all the answers

    What does enforced password complexity imply?

    <p>Passwords should include a minimum length and varied characters.</p> Signup and view all the answers

    What is the purpose of replay-resistant authentication mechanisms?

    <p>To deter unauthorized users from accessing systems multiple times.</p> Signup and view all the answers

    What is a consequence of having a defined period of inactivity for identifiers?

    <p>Identifiers are disabled to enhance security.</p> Signup and view all the answers

    Which of the following statements about password reuse is true?

    <p>Prohibiting password reuse for a specified number of generations enhances security.</p> Signup and view all the answers

    What ensures that the contactless RF chip in the eID card cannot be accessed without authorization?

    <p>Password Authenticated Connection Establishment (PACE)</p> Signup and view all the answers

    Which method is commonly used to generate a time-based one-time password (TOTP)?

    <p>HMAC with a hash function</p> Signup and view all the answers

    What is the risk associated with a one-time password (OTP) device?

    <p>The secret key is vulnerable to interception</p> Signup and view all the answers

    In which scenario is the machine-readable zone (MRZ) primarily used?

    <p>To establish offline access with a card access number</p> Signup and view all the answers

    What should systems using time-based OTP accommodate for successful authentication?

    <p>Clock drift between token and system</p> Signup and view all the answers

    Which component of an OTP device is crucial for securely generating the password?

    <p>Tamper-resistant module</p> Signup and view all the answers

    What is the purpose of the personal identification number (PIN) in the context of eID cards?

    <p>To provide confidential access to the RF chip</p> Signup and view all the answers

    What distinguishes single-factor authentication from other methods?

    <p>It typically involves only one form of verification</p> Signup and view all the answers

    What function does the eID PIN serve in online applications?

    <p>It functions as a signature key for electronic signatures.</p> Signup and view all the answers

    Which of the following data can be accessed or read by eID functions?

    <p>Date and place of birth</p> Signup and view all the answers

    What is the purpose of the electronic signature creation in eID?

    <p>To certify user transactions and identity.</p> Signup and view all the answers

    What information would be typically included in an eID revocation query?

    <p>Validity of an ID or certification status</p> Signup and view all the answers

    Which of the following is NOT a function of eID?

    <p>Social media management</p> Signup and view all the answers

    What is one of the uses of the signature key in electronic signatures?

    <p>To verify authenticity of documents.</p> Signup and view all the answers

    In the context of eID, what does 'PAC E Password' refer to?

    <p>A password required to access the electronic signature creation function.</p> Signup and view all the answers

    Which of the following options relates to community ID verification in eID functions?

    <p>It checks the ID for expiration date.</p> Signup and view all the answers

    What is a potential disadvantage of using mobile authentication apps?

    <p>Phone might be lost or stolen</p> Signup and view all the answers

    Which attack method specifically targets a mobile user's access to their authentication?

    <p>SIM swap attack</p> Signup and view all the answers

    What unique characteristic is NOT used in biometric authentication?

    <p>Password strength</p> Signup and view all the answers

    What type of protocol is generally used to enhance security during remote user authentication?

    <p>Challenge-response protocol</p> Signup and view all the answers

    Which of the following is a challenge faced specifically by remote user authentication?

    <p>Increased complexity and security threats</p> Signup and view all the answers

    What is a common defense against password guessing attacks?

    <p>Use of larger entropy and limited attempts</p> Signup and view all the answers

    What type of attack attempts to disable a user authentication service through an overload?

    <p>Denial of Service</p> Signup and view all the answers

    Which biometric matching method is considered technically complex and expensive?

    <p>Biometric authentication</p> Signup and view all the answers

    What is a risk associated with attackers using fake mobile towers?

    <p>Intercepting SMS messages</p> Signup and view all the answers

    In the context of client attacks, what is a common method attackers use to achieve unauthorized access?

    <p>Spoofing user credentials</p> Signup and view all the answers

    Study Notes

    Digital User Authentication Principles

    • Digital identity is a unique representation of a subject in online transactions (NIST SP 800-63-3).
    • Digital user authentication determines the validity of authenticators claiming a digital identity.
    • Basic security requirements include identifying users, authenticating identities, and employing multifactor authentication (MFA).

    Password-Based Authentication

    • Requires users to authenticate with something they know, such as a password or PIN.
    • Security measures include enforcing complexity, preventing reuse, and disabling inactive accounts.

    Token-Based Authentication

    • Users authenticate with something they possess, like a smartcard or electronic keycard.
    • One-time passwords (OTP) generated by devices increase security for transactions.
    • Alternatives like time-based OTP (TOTP) rely on algorithms and a secure clock, but vulnerable to clock drift issues.

    Biometric Authentication

    • Utilizes unique physical characteristics (e.g., fingerprints, facial recognition) for user authentication.
    • Technically complex and expensive compared to traditional methods, yet provides heightened security.

    Multifactor Authentication (MFA)

    • MFA involves using two or more factors for identity verification, such as passwords combined with tokens or biometrics.
    • Enhances security compared to single-factor authentication methods.

    Assurance Levels for User Authentication

    • Identity Assurance Levels (IAL) define certainty in identity proofing:
      • IAL1: No link to real identity required.
      • IAL2: Evidence of identity through remote or in-person proofing.
      • IAL3: Physical presence is needed for proofing.
    • Authenticator Assurance Levels (AAL) gauge authentication strength:
      • AAL1: User ID and password provide some assurance.
      • Higher levels require stronger proof mechanisms.

    Security Issues for User Authentication

    • User authentication is subject to attacks like eavesdropping, replay attacks, and client/host attacks.
    • Common attacks include password guessing, token theft, and biometric spoofing.
    • Defense strategies involve multifactor authentication, large entropy for identifiers, and rigorous password protection measures.

    Remote User Authentication Challenges

    • Increased complexity and vulnerability over networks due to threats like capturing passwords and replaying authentication sequences.
    • Challenge-response protocols can mitigate some security risks associated with remote authentication.

    Case Study: ATM Security Problems

    • Small to mid-sized debit card issuers often rely on processors for core data processing and electronic funds transfer, leading to potential vulnerabilities in ATM security.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Description

    This quiz covers essential concepts of user authentication, including password-based, token-based, and biometric methods. You will explore digital identity principles and prevalent security issues related to user authentication. Test your knowledge on the guidelines and best practices for ensuring secure user access.

    More Quizzes Like This

    Use Quizgecko on...
    Browser
    Browser