Preventing Password Guessing Attacks
30 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Smart cards are similar in shape and size to a driver's license.

False

A password is vulnerable if it is short and easy to guess, like a birthday or a child's name.

True

To prevent guessing, it is recommended to use a long and randomly generated password.

True

Smart cards have an integrated microprocessor that allows them to perform calculations on stored data.

<p>True</p> Signup and view all the answers

Smart cards can only store information but cannot perform any calculations.

<p>False</p> Signup and view all the answers

A dictionary attack involves trying all possible combinations of characters to crack a password.

<p>False</p> Signup and view all the answers

In password-based authentication, the system stores user names along with the plain-text passwords in a file.

<p>False</p> Signup and view all the answers

The transformation function F applied to the password makes it easy to compute the original password.

<p>False</p> Signup and view all the answers

One of the advantages of passwords is that they do not need to be memorized by the user.

<p>False</p> Signup and view all the answers

Eavesdropping refers to the act of physically stealing a password.

<p>False</p> Signup and view all the answers

Stealing a password can be prevented if the user writes it down instead of committing it to memory.

<p>False</p> Signup and view all the answers

Accessing a file where passwords are stored is an example of an attack on passwords.

<p>True</p> Signup and view all the answers

The microcomputer of a smart-card performs a two-way transformation on the PIN.

<p>False</p> Signup and view all the answers

The mathematical function (f) used in the smart-card transformation can be easily determined.

<p>False</p> Signup and view all the answers

The smart card's microcomputer chip compares the entered PIN with the stored PIN to authenticate the user.

<p>True</p> Signup and view all the answers

Biometrics systems can identify users based on either physiological or behavioral characteristics.

<p>True</p> Signup and view all the answers

One of the properties of a biometric characteristic is that it should be constantly changing over time.

<p>False</p> Signup and view all the answers

Circumvention means that it should be easy to fool the system by fraudulent techniques.

<p>False</p> Signup and view all the answers

User Authentication is the process of verifying that the user's claimed-identity is valid.

<p>True</p> Signup and view all the answers

Message Authentication ensures that the receiver knows the sender's identity and that the message is not sent by an imposter.

<p>False</p> Signup and view all the answers

User Authentication can be based on something the user knows, such as a fingerprint or voice scan.

<p>False</p> Signup and view all the answers

Biometrics like iris scan, retina scan, or hand geometry fall under the category of 'Something the user knows' for authentication.

<p>False</p> Signup and view all the answers

Password-based Authentication involves using a protected string of characters to authenticate an individual.

<p>True</p> Signup and view all the answers

Message Authentication primarily focuses on verifying the user's identity before granting access to system resources.

<p>False</p> Signup and view all the answers

Behavior-based biometrics is one of the two parts into which biometrics is divided.

<p>True</p> Signup and view all the answers

During enrollment, the user introduces their biometric information to the device for the first time.

<p>True</p> Signup and view all the answers

Matching in biometric authentication involves comparing the live template with the stored template to generate a biometric score.

<p>True</p> Signup and view all the answers

In multi-factor authentication, at least three authentication techniques are combined for stronger assurance.

<p>False</p> Signup and view all the answers

Two-factor authentication (2FA) allows presenting three pieces of evidence when logging in.

<p>False</p> Signup and view all the answers

Live presentation in biometric authentication refers to extracting fingerprint features.

<p>False</p> Signup and view all the answers

More Like This

Password Security and Cracking Techniques
9 questions
Password Security Best Practices
10 questions
Strengthening Password Security
8 questions
Use Quizgecko on...
Browser
Browser