Podcast
Questions and Answers
What is the primary purpose of using a salt value in password hashing?
What is the primary purpose of using a salt value in password hashing?
- To store passwords in a password file
- To grant privileges to a user based on their ID
- To prevent workstation hijacking
- To prevent duplicate passwords and make offline dictionary attacks more difficult (correct)
What is the main benefit of password hashing in terms of password security?
What is the main benefit of password hashing in terms of password security?
- It makes it easier to conduct offline dictionary attacks
- It prevents cybercriminals from getting access to the passwords file (correct)
- It allows for easy password recovery
- It grants excessive privileges to users
What type of attack is made more difficult by the use of hashed passwords and salt values?
What type of attack is made more difficult by the use of hashed passwords and salt values?
- Specific account attack
- Workstation hijacking
- Offline dictionary attack (correct)
- Electronic monitoring
What is the primary function of the ID in discretionary access control?
What is the primary function of the ID in discretionary access control?
What is the purpose of designing a hash algorithm to be slow to execute?
What is the purpose of designing a hash algorithm to be slow to execute?
What is a common type of password vulnerability?
What is a common type of password vulnerability?
What is the primary purpose of using salt values in password hashing?
What is the primary purpose of using salt values in password hashing?
Why are shorter password lengths more susceptible to cracking?
Why are shorter password lengths more susceptible to cracking?
What type of attack is an attacker planning when using a rainbow table?
What type of attack is an attacker planning when using a rainbow table?
What is the purpose of a password file access control?
What is the purpose of a password file access control?
What is the primary goal of proactive password checking?
What is the primary goal of proactive password checking?
What type of authentication uses objects possessed by users for authentication purposes?
What type of authentication uses objects possessed by users for authentication purposes?
What is a disadvantage of using SMS-based one-time passwords for authentication?
What is a disadvantage of using SMS-based one-time passwords for authentication?
What is a type of attack that involves intercepting messages using a fake mobile tower or attacking SS7 signaling protocol?
What is a type of attack that involves intercepting messages using a fake mobile tower or attacking SS7 signaling protocol?
What is a characteristic of mobile authentication apps?
What is a characteristic of mobile authentication apps?
What is a disadvantage of using biometric authentication?
What is a disadvantage of using biometric authentication?
What is a type of attack that involves an adversary attempting to learn a password by some sort of attack that involves physical proximity?
What is a type of attack that involves an adversary attempting to learn a password by some sort of attack that involves physical proximity?
What is a common defense against password guessing attacks?
What is a common defense against password guessing attacks?
What is a type of attack that involves an adversary repeating a previously captured user response?
What is a type of attack that involves an adversary repeating a previously captured user response?
What is a type of attack that involves an application or physical device masquerading as an authentic application or device?
What is a type of attack that involves an application or physical device masquerading as an authentic application or device?
What is a type of attack that involves an adversary attempting to disable a user authentication service by flooding the service with numerous authentication attempts?
What is a type of attack that involves an adversary attempting to disable a user authentication service by flooding the service with numerous authentication attempts?