Password Authentication and Protection
29 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Passwords are the ______ line of defense in a security arsenal.

first

Password is usually stored as ______ (not plain text)

hashes

Password authentication answers the question: How do you prove to someone that you are who you ______ to be?

claim

The Greek word 'αυθεντικός' means ______ or genuine.

<p>real</p> Signup and view all the answers

A hash function H must have the property of being ______: given H(password), hard to find password

<p>one-way</p> Signup and view all the answers

A good hash function should be ______-resistant: given H(password1), hard to find password2 such that: H(password1) = H(password2)

<p>collision</p> Signup and view all the answers

Authentication establishes that the user is who they say they are through their ______.

<p>credentials</p> Signup and view all the answers

The process of deciding if the authenticated person is allowed to access specific information or functions is called ______.

<p>authorization</p> Signup and view all the answers

The hashing algorithm converts plain-text into a ______ digest

<p>message</p> Signup and view all the answers

The restriction of access includes both ______ and authorization.

<p>authentication</p> Signup and view all the answers

Examples of hashing algorithms include ______ and SHA

<p>MD5</p> Signup and view all the answers

Early UNIX systems used modified ______ as if it were a hash function.

<p>DES</p> Signup and view all the answers

The password file was stored in the ______ directory.

<p>etc/passwd</p> Signup and view all the answers

Newer UNIX systems store password hashes in the ______ directory.

<p>etc/shadow</p> Signup and view all the answers

Windows NT/2k/XP/Vista uses the ______ hash for storing passwords.

<p>LAN Manager</p> Signup and view all the answers

The password is padded with zeros until there are ______ characters.

<p>14</p> Signup and view all the answers

The ______ program had a buffer overflow in early shadow implementations on Linux.

<p>login</p> Signup and view all the answers

Different types of __________ exist:

<p>tokens</p> Signup and view all the answers

A secret value that is stored on a token and is available after the token has been unlocked using a __________:

<p>PIN</p> Signup and view all the answers

A __________ token contains the digital signature private key and computes a digital signature on a supplied data value:

<p>Digital Signature</p> Signup and view all the answers

Single sign-on can provide a better __________ experience for users:

<p>security</p> Signup and view all the answers

A virtual keyboard is used to prevent __________:

<p>keylogging</p> Signup and view all the answers

Graphical passwords rely on the difficulty of __________ vision:

<p>computer</p> Signup and view all the answers

The password is then converted to ______ and split into two 7-character pieces.

<p>uppercase</p> Signup and view all the answers

Each half is encrypted using an ______-byte DES key.

<p>8</p> Signup and view all the answers

The result is combined into a ______-byte, one way hash value.

<p>16</p> Signup and view all the answers

The utility which moves the encryption key for the SAM database off of the computer is called ______.

<p>SYSKEY</p> Signup and view all the answers

Tools such as LOphtCrack allow admittance into almost anyone's account if a simple ______-digit password is used.

<p>eight</p> Signup and view all the answers

This was the kind of tool which we found (in Al Qaeda's ______).

<p>arsenal</p> Signup and view all the answers

More Like This

Use Quizgecko on...
Browser
Browser