Podcast
Questions and Answers
Smart cards are similar in shape and size to a driver's license.
Smart cards are similar in shape and size to a driver's license.
False
A password is vulnerable if it is short and easy to guess, like a birthday or a child's name.
A password is vulnerable if it is short and easy to guess, like a birthday or a child's name.
True
To prevent guessing, it is recommended to use a long and randomly generated password.
To prevent guessing, it is recommended to use a long and randomly generated password.
True
Smart cards have an integrated microprocessor that allows them to perform calculations on stored data.
Smart cards have an integrated microprocessor that allows them to perform calculations on stored data.
Signup and view all the answers
Smart cards can only store information but cannot perform any calculations.
Smart cards can only store information but cannot perform any calculations.
Signup and view all the answers
A dictionary attack involves trying all possible combinations of characters to crack a password.
A dictionary attack involves trying all possible combinations of characters to crack a password.
Signup and view all the answers
In password-based authentication, the system stores user names along with the plain-text passwords in a file.
In password-based authentication, the system stores user names along with the plain-text passwords in a file.
Signup and view all the answers
The transformation function F applied to the password makes it easy to compute the original password.
The transformation function F applied to the password makes it easy to compute the original password.
Signup and view all the answers
One of the advantages of passwords is that they do not need to be memorized by the user.
One of the advantages of passwords is that they do not need to be memorized by the user.
Signup and view all the answers
Eavesdropping refers to the act of physically stealing a password.
Eavesdropping refers to the act of physically stealing a password.
Signup and view all the answers
Stealing a password can be prevented if the user writes it down instead of committing it to memory.
Stealing a password can be prevented if the user writes it down instead of committing it to memory.
Signup and view all the answers
Accessing a file where passwords are stored is an example of an attack on passwords.
Accessing a file where passwords are stored is an example of an attack on passwords.
Signup and view all the answers
The microcomputer of a smart-card performs a two-way transformation on the PIN.
The microcomputer of a smart-card performs a two-way transformation on the PIN.
Signup and view all the answers
The mathematical function (f) used in the smart-card transformation can be easily determined.
The mathematical function (f) used in the smart-card transformation can be easily determined.
Signup and view all the answers
The smart card's microcomputer chip compares the entered PIN with the stored PIN to authenticate the user.
The smart card's microcomputer chip compares the entered PIN with the stored PIN to authenticate the user.
Signup and view all the answers
Biometrics systems can identify users based on either physiological or behavioral characteristics.
Biometrics systems can identify users based on either physiological or behavioral characteristics.
Signup and view all the answers
One of the properties of a biometric characteristic is that it should be constantly changing over time.
One of the properties of a biometric characteristic is that it should be constantly changing over time.
Signup and view all the answers
Circumvention means that it should be easy to fool the system by fraudulent techniques.
Circumvention means that it should be easy to fool the system by fraudulent techniques.
Signup and view all the answers
User Authentication is the process of verifying that the user's claimed-identity is valid.
User Authentication is the process of verifying that the user's claimed-identity is valid.
Signup and view all the answers
Message Authentication ensures that the receiver knows the sender's identity and that the message is not sent by an imposter.
Message Authentication ensures that the receiver knows the sender's identity and that the message is not sent by an imposter.
Signup and view all the answers
User Authentication can be based on something the user knows, such as a fingerprint or voice scan.
User Authentication can be based on something the user knows, such as a fingerprint or voice scan.
Signup and view all the answers
Biometrics like iris scan, retina scan, or hand geometry fall under the category of 'Something the user knows' for authentication.
Biometrics like iris scan, retina scan, or hand geometry fall under the category of 'Something the user knows' for authentication.
Signup and view all the answers
Password-based Authentication involves using a protected string of characters to authenticate an individual.
Password-based Authentication involves using a protected string of characters to authenticate an individual.
Signup and view all the answers
Message Authentication primarily focuses on verifying the user's identity before granting access to system resources.
Message Authentication primarily focuses on verifying the user's identity before granting access to system resources.
Signup and view all the answers
Behavior-based biometrics is one of the two parts into which biometrics is divided.
Behavior-based biometrics is one of the two parts into which biometrics is divided.
Signup and view all the answers
During enrollment, the user introduces their biometric information to the device for the first time.
During enrollment, the user introduces their biometric information to the device for the first time.
Signup and view all the answers
Matching in biometric authentication involves comparing the live template with the stored template to generate a biometric score.
Matching in biometric authentication involves comparing the live template with the stored template to generate a biometric score.
Signup and view all the answers
In multi-factor authentication, at least three authentication techniques are combined for stronger assurance.
In multi-factor authentication, at least three authentication techniques are combined for stronger assurance.
Signup and view all the answers
Two-factor authentication (2FA) allows presenting three pieces of evidence when logging in.
Two-factor authentication (2FA) allows presenting three pieces of evidence when logging in.
Signup and view all the answers
Live presentation in biometric authentication refers to extracting fingerprint features.
Live presentation in biometric authentication refers to extracting fingerprint features.
Signup and view all the answers