Podcast
Questions and Answers
Passwords are the ______ line of defense in a security arsenal.
Passwords are the ______ line of defense in a security arsenal.
first
Password is usually stored as ______ (not plain text)
Password is usually stored as ______ (not plain text)
hashes
Password authentication answers the question: How do you prove to someone that you are who you ______ to be?
Password authentication answers the question: How do you prove to someone that you are who you ______ to be?
claim
The Greek word 'αυθεντικός' means ______ or genuine.
The Greek word 'αυθεντικός' means ______ or genuine.
Signup and view all the answers
A hash function H must have the property of being ______: given H(password), hard to find password
A hash function H must have the property of being ______: given H(password), hard to find password
Signup and view all the answers
A good hash function should be ______-resistant: given H(password1), hard to find password2 such that: H(password1) = H(password2)
A good hash function should be ______-resistant: given H(password1), hard to find password2 such that: H(password1) = H(password2)
Signup and view all the answers
Authentication establishes that the user is who they say they are through their ______.
Authentication establishes that the user is who they say they are through their ______.
Signup and view all the answers
The process of deciding if the authenticated person is allowed to access specific information or functions is called ______.
The process of deciding if the authenticated person is allowed to access specific information or functions is called ______.
Signup and view all the answers
The hashing algorithm converts plain-text into a ______ digest
The hashing algorithm converts plain-text into a ______ digest
Signup and view all the answers
The restriction of access includes both ______ and authorization.
The restriction of access includes both ______ and authorization.
Signup and view all the answers
Examples of hashing algorithms include ______ and SHA
Examples of hashing algorithms include ______ and SHA
Signup and view all the answers
Early UNIX systems used modified ______ as if it were a hash function.
Early UNIX systems used modified ______ as if it were a hash function.
Signup and view all the answers
The password file was stored in the ______ directory.
The password file was stored in the ______ directory.
Signup and view all the answers
Newer UNIX systems store password hashes in the ______ directory.
Newer UNIX systems store password hashes in the ______ directory.
Signup and view all the answers
Windows NT/2k/XP/Vista uses the ______ hash for storing passwords.
Windows NT/2k/XP/Vista uses the ______ hash for storing passwords.
Signup and view all the answers
The password is padded with zeros until there are ______ characters.
The password is padded with zeros until there are ______ characters.
Signup and view all the answers
The ______ program had a buffer overflow in early shadow implementations on Linux.
The ______ program had a buffer overflow in early shadow implementations on Linux.
Signup and view all the answers
Different types of __________ exist:
Different types of __________ exist:
Signup and view all the answers
A secret value that is stored on a token and is available after the token has been unlocked using a __________:
A secret value that is stored on a token and is available after the token has been unlocked using a __________:
Signup and view all the answers
A __________ token contains the digital signature private key and computes a digital signature on a supplied data value:
A __________ token contains the digital signature private key and computes a digital signature on a supplied data value:
Signup and view all the answers
Single sign-on can provide a better __________ experience for users:
Single sign-on can provide a better __________ experience for users:
Signup and view all the answers
A virtual keyboard is used to prevent __________:
A virtual keyboard is used to prevent __________:
Signup and view all the answers
Graphical passwords rely on the difficulty of __________ vision:
Graphical passwords rely on the difficulty of __________ vision:
Signup and view all the answers
The password is then converted to ______ and split into two 7-character pieces.
The password is then converted to ______ and split into two 7-character pieces.
Signup and view all the answers
Each half is encrypted using an ______-byte DES key.
Each half is encrypted using an ______-byte DES key.
Signup and view all the answers
The result is combined into a ______-byte, one way hash value.
The result is combined into a ______-byte, one way hash value.
Signup and view all the answers
The utility which moves the encryption key for the SAM database off of the computer is called ______.
The utility which moves the encryption key for the SAM database off of the computer is called ______.
Signup and view all the answers
Tools such as LOphtCrack allow admittance into almost anyone's account if a simple ______-digit password is used.
Tools such as LOphtCrack allow admittance into almost anyone's account if a simple ______-digit password is used.
Signup and view all the answers
This was the kind of tool which we found (in Al Qaeda's ______).
This was the kind of tool which we found (in Al Qaeda's ______).
Signup and view all the answers