Podcast
Questions and Answers
Passwords are the ______ line of defense in a security arsenal.
Passwords are the ______ line of defense in a security arsenal.
first
Password is usually stored as ______ (not plain text)
Password is usually stored as ______ (not plain text)
hashes
Password authentication answers the question: How do you prove to someone that you are who you ______ to be?
Password authentication answers the question: How do you prove to someone that you are who you ______ to be?
claim
The Greek word 'αυθεντικός' means ______ or genuine.
The Greek word 'αυθεντικός' means ______ or genuine.
A hash function H must have the property of being ______: given H(password), hard to find password
A hash function H must have the property of being ______: given H(password), hard to find password
A good hash function should be ______-resistant: given H(password1), hard to find password2 such that: H(password1) = H(password2)
A good hash function should be ______-resistant: given H(password1), hard to find password2 such that: H(password1) = H(password2)
Authentication establishes that the user is who they say they are through their ______.
Authentication establishes that the user is who they say they are through their ______.
The process of deciding if the authenticated person is allowed to access specific information or functions is called ______.
The process of deciding if the authenticated person is allowed to access specific information or functions is called ______.
The hashing algorithm converts plain-text into a ______ digest
The hashing algorithm converts plain-text into a ______ digest
The restriction of access includes both ______ and authorization.
The restriction of access includes both ______ and authorization.
Examples of hashing algorithms include ______ and SHA
Examples of hashing algorithms include ______ and SHA
Early UNIX systems used modified ______ as if it were a hash function.
Early UNIX systems used modified ______ as if it were a hash function.
The password file was stored in the ______ directory.
The password file was stored in the ______ directory.
Newer UNIX systems store password hashes in the ______ directory.
Newer UNIX systems store password hashes in the ______ directory.
Windows NT/2k/XP/Vista uses the ______ hash for storing passwords.
Windows NT/2k/XP/Vista uses the ______ hash for storing passwords.
The password is padded with zeros until there are ______ characters.
The password is padded with zeros until there are ______ characters.
The ______ program had a buffer overflow in early shadow implementations on Linux.
The ______ program had a buffer overflow in early shadow implementations on Linux.
Different types of __________ exist:
Different types of __________ exist:
A secret value that is stored on a token and is available after the token has been unlocked using a __________:
A secret value that is stored on a token and is available after the token has been unlocked using a __________:
A __________ token contains the digital signature private key and computes a digital signature on a supplied data value:
A __________ token contains the digital signature private key and computes a digital signature on a supplied data value:
Single sign-on can provide a better __________ experience for users:
Single sign-on can provide a better __________ experience for users:
A virtual keyboard is used to prevent __________:
A virtual keyboard is used to prevent __________:
Graphical passwords rely on the difficulty of __________ vision:
Graphical passwords rely on the difficulty of __________ vision:
The password is then converted to ______ and split into two 7-character pieces.
The password is then converted to ______ and split into two 7-character pieces.
Each half is encrypted using an ______-byte DES key.
Each half is encrypted using an ______-byte DES key.
The result is combined into a ______-byte, one way hash value.
The result is combined into a ______-byte, one way hash value.
The utility which moves the encryption key for the SAM database off of the computer is called ______.
The utility which moves the encryption key for the SAM database off of the computer is called ______.
Tools such as LOphtCrack allow admittance into almost anyone's account if a simple ______-digit password is used.
Tools such as LOphtCrack allow admittance into almost anyone's account if a simple ______-digit password is used.
This was the kind of tool which we found (in Al Qaeda's ______).
This was the kind of tool which we found (in Al Qaeda's ______).
Flashcards are hidden until you start studying