29 Questions
Passwords are the ______ line of defense in a security arsenal.
first
Password is usually stored as ______ (not plain text)
hashes
Password authentication answers the question: How do you prove to someone that you are who you ______ to be?
claim
The Greek word 'αυθεντικός' means ______ or genuine.
real
A hash function H must have the property of being ______: given H(password), hard to find password
one-way
A good hash function should be ______-resistant: given H(password1), hard to find password2 such that: H(password1) = H(password2)
collision
Authentication establishes that the user is who they say they are through their ______.
credentials
The process of deciding if the authenticated person is allowed to access specific information or functions is called ______.
authorization
The hashing algorithm converts plain-text into a ______ digest
message
The restriction of access includes both ______ and authorization.
authentication
Examples of hashing algorithms include ______ and SHA
MD5
Early UNIX systems used modified ______ as if it were a hash function.
DES
The password file was stored in the ______ directory.
etc/passwd
Newer UNIX systems store password hashes in the ______ directory.
etc/shadow
Windows NT/2k/XP/Vista uses the ______ hash for storing passwords.
LAN Manager
The password is padded with zeros until there are ______ characters.
14
The ______ program had a buffer overflow in early shadow implementations on Linux.
login
Different types of __________ exist:
tokens
A secret value that is stored on a token and is available after the token has been unlocked using a __________:
PIN
A __________ token contains the digital signature private key and computes a digital signature on a supplied data value:
Digital Signature
Single sign-on can provide a better __________ experience for users:
security
A virtual keyboard is used to prevent __________:
keylogging
Graphical passwords rely on the difficulty of __________ vision:
computer
The password is then converted to ______ and split into two 7-character pieces.
uppercase
Each half is encrypted using an ______-byte DES key.
8
The result is combined into a ______-byte, one way hash value.
16
The utility which moves the encryption key for the SAM database off of the computer is called ______.
SYSKEY
Tools such as LOphtCrack allow admittance into almost anyone's account if a simple ______-digit password is used.
eight
This was the kind of tool which we found (in Al Qaeda's ______).
arsenal
This quiz covers the importance of passwords as the first line of defense in security and what they protect, including ATMs, company proprietary information, and email accounts.
Make Your Own Quizzes and Flashcards
Convert your notes into interactive study material.
Get started for free