Preventing Password Guessing Attacks

WonSugilite4714 avatar
WonSugilite4714
·
·
Download

Start Quiz

Study Flashcards

30 Questions

Smart cards are similar in shape and size to a driver's license.

False

A password is vulnerable if it is short and easy to guess, like a birthday or a child's name.

True

To prevent guessing, it is recommended to use a long and randomly generated password.

True

Smart cards have an integrated microprocessor that allows them to perform calculations on stored data.

True

Smart cards can only store information but cannot perform any calculations.

False

A dictionary attack involves trying all possible combinations of characters to crack a password.

False

In password-based authentication, the system stores user names along with the plain-text passwords in a file.

False

The transformation function F applied to the password makes it easy to compute the original password.

False

One of the advantages of passwords is that they do not need to be memorized by the user.

False

Eavesdropping refers to the act of physically stealing a password.

False

Stealing a password can be prevented if the user writes it down instead of committing it to memory.

False

Accessing a file where passwords are stored is an example of an attack on passwords.

True

The microcomputer of a smart-card performs a two-way transformation on the PIN.

False

The mathematical function (f) used in the smart-card transformation can be easily determined.

False

The smart card's microcomputer chip compares the entered PIN with the stored PIN to authenticate the user.

True

Biometrics systems can identify users based on either physiological or behavioral characteristics.

True

One of the properties of a biometric characteristic is that it should be constantly changing over time.

False

Circumvention means that it should be easy to fool the system by fraudulent techniques.

False

User Authentication is the process of verifying that the user's claimed-identity is valid.

True

Message Authentication ensures that the receiver knows the sender's identity and that the message is not sent by an imposter.

False

User Authentication can be based on something the user knows, such as a fingerprint or voice scan.

False

Biometrics like iris scan, retina scan, or hand geometry fall under the category of 'Something the user knows' for authentication.

False

Password-based Authentication involves using a protected string of characters to authenticate an individual.

True

Message Authentication primarily focuses on verifying the user's identity before granting access to system resources.

False

Behavior-based biometrics is one of the two parts into which biometrics is divided.

True

During enrollment, the user introduces their biometric information to the device for the first time.

True

Matching in biometric authentication involves comparing the live template with the stored template to generate a biometric score.

True

In multi-factor authentication, at least three authentication techniques are combined for stronger assurance.

False

Two-factor authentication (2FA) allows presenting three pieces of evidence when logging in.

False

Live presentation in biometric authentication refers to extracting fingerprint features.

False

Learn about preventing password guessing attacks by using long, random passwords instead of short, predictable ones. This quiz highlights the vulnerability of short, easily guessable passwords and provides recommendations for stronger password security measures.

Make Your Own Quizzes and Flashcards

Convert your notes into interactive study material.

Get started for free

More Quizzes Like This

Use Quizgecko on...
Browser
Browser