Password Authentication and Protection

ValiantAqua32 avatar
ValiantAqua32
·
·
Download

Start Quiz

Study Flashcards

29 Questions

Passwords are the ______ line of defense in a security arsenal.

first

Password is usually stored as ______ (not plain text)

hashes

Password authentication answers the question: How do you prove to someone that you are who you ______ to be?

claim

The Greek word 'αυθεντικός' means ______ or genuine.

real

A hash function H must have the property of being ______: given H(password), hard to find password

one-way

A good hash function should be ______-resistant: given H(password1), hard to find password2 such that: H(password1) = H(password2)

collision

Authentication establishes that the user is who they say they are through their ______.

credentials

The process of deciding if the authenticated person is allowed to access specific information or functions is called ______.

authorization

The hashing algorithm converts plain-text into a ______ digest

message

The restriction of access includes both ______ and authorization.

authentication

Examples of hashing algorithms include ______ and SHA

MD5

Early UNIX systems used modified ______ as if it were a hash function.

DES

The password file was stored in the ______ directory.

etc/passwd

Newer UNIX systems store password hashes in the ______ directory.

etc/shadow

Windows NT/2k/XP/Vista uses the ______ hash for storing passwords.

LAN Manager

The password is padded with zeros until there are ______ characters.

14

The ______ program had a buffer overflow in early shadow implementations on Linux.

login

Different types of __________ exist:

tokens

A secret value that is stored on a token and is available after the token has been unlocked using a __________:

PIN

A __________ token contains the digital signature private key and computes a digital signature on a supplied data value:

Digital Signature

Single sign-on can provide a better __________ experience for users:

security

A virtual keyboard is used to prevent __________:

keylogging

Graphical passwords rely on the difficulty of __________ vision:

computer

The password is then converted to ______ and split into two 7-character pieces.

uppercase

Each half is encrypted using an ______-byte DES key.

8

The result is combined into a ______-byte, one way hash value.

16

The utility which moves the encryption key for the SAM database off of the computer is called ______.

SYSKEY

Tools such as LOphtCrack allow admittance into almost anyone's account if a simple ______-digit password is used.

eight

This was the kind of tool which we found (in Al Qaeda's ______).

arsenal

This quiz covers the importance of passwords as the first line of defense in security and what they protect, including ATMs, company proprietary information, and email accounts.

Make Your Own Quizzes and Flashcards

Convert your notes into interactive study material.

Get started for free

More Quizzes Like This

Use Quizgecko on...
Browser
Browser