Computer Security Principles And Practice Global 3rd Edition Stallings Test Bank

Page 1

Chapter 3 – User Authentication

TRUE/FALSE QUESTIONS:

T F 1. Userauthenticationisthefundamentalbuildingblockandtheprimary lineofdefense.

T F 2. Identificationisthemeansofestablishingthevalidityofa claimed identityprovidedbya user.

T F 3. Dependingonthedetailsoftheoverallauthentication system,theregistrationauthorityissuessomesort ofelectronic credentialtothesubscriber.

T F 4. Manyuserschoosea passwordthatistooshortortooeasyto guess.

T F 5. Userauthenticationisaprocedurethat allowscommunicatingpartiesto verifythatthecontentsofareceivedmessagehavenotbeenalteredand thatthesourceisauthentic.

T F 6. Agoodtechniquefor choosingapasswordistousethefirstletterof eachwordofaphrase.

T F 7. Userauthenticationisthebasisformosttypesofaccesscontroland for useraccountability.

T F 8. Memorycardsstoreandprocessdata.

T F 9. Dependingontheapplication,userauthenticationonabiometric systeminvolveseitherverificationoridentification.

T F 10. Enrollmentcreatesanassociationbetweenauserandtheuser’s biometriccharacteristics.

T F 11. Anindividual’ssignatureisnotuniqueenoughtouseinbiometric applications.

T F 12. Identifiersshouldbe assigned carefullybecauseauthenticated identitiesarethebasisforothersecurityservices.

T F 13. Asmartcardcontainsanentiremicroprocessor.

ComputerSecurity:PrinciplesandPractice,3rd Edition Chapter3
Computer Security Principles And Practice Global 3rd Edition Stallings Test Bank Full Download: http://testbanktip.com/download/computer-security-principles-and-practice-global-3rd-edition-stallings-test-bank/ Download all pages and all chapters at: TestBankTip.com

T F 14. Keyloggingisa formofhostattack.

T F 15. In abiometricschemesomephysicalcharacteristicoftheindividualis mappedintoadigital representation.

MULTIPLE CHOICE QUESTIONS:

1. __________definesuser authenticationas“theprocessofverifyinganidentity claimedbyorfor asystementity”.

A. RFC4949 C. RFC2298

B. RFC2493 D. RFC2328

2. Presentingor generatingauthenticationinformationthatcorroboratesthebinding betweenthe entityandtheidentifieristhe___________.

A. identificationstep

B.authenticationstep

C. verificationstep

D. corroborationstep

3. Recognitionbyfingerprint,retina,andface are examplesof__________.

A. facerecognition

B. staticbiometrics

C. dynamicbiometrics

D. tokenauthentication

4. A__________isapasswordguessingprogram.

A. passwordhash

B. passwordbiometric

C. passwordcracker

D. passwordsalt

5. The__________strategyiswhenusers aretoldtheimportanceofusinghardto guesspasswordsandprovidedwithguidelinesfor selectingstrongpasswords.

A. reactivepassword checking

B. computer-generatedpassword

C. proactivepasswordchecking

D. usereducation

ComputerSecurity:PrinciplesandPractice,3rd Edition Chapter3

6. A__________strategyisoneinwhichthesystemperiodicallyrunsitsown passwordcrackertofind guessablepasswords.

A. usereducation

B. reactivepasswordchecking

C. proactivepasswordchecking

D. computer-generatedpassword

7. Themostcommonmeansofhuman-to-humanidentificationare__________.

A. facial characteristics

C. signatures

B. retinalpatterns D. fingerprints

8. __________systemsidentifyfeaturesofthehand,includingshape, and lengths andwidthsoffingers.

A. Signature C. Handgeometry

B. Fingerprint D. Palmprint

9. Eachindividualwhoistobeincludedinthedatabaseof authorizedusersmustfirst be__________inthesystem.

A. verified C. authenticated

B. identified D. enrolled

10. Tocounterthreatstoremoteuser authentication,systems generallyrelyonsome formof___________protocol.

A. eavesdropping

B. challenge-response

C. Trojanhorse

D. denial-of-service

11. A__________iswhenanadversaryattemptstoachieveuserauthentication withoutaccesstotheremotehostortotheinterveningcommunicationspath.

A. clientattack

B. hostattack

C. eavesdroppingattack

D. Trojanhorse attack

ComputerSecurity:PrinciplesandPractice,3rd Edition Chapter3

12. A__________isdirectedattheuserfile atthehostwherepasswords, token passcodes,orbiometrictemplatesarestored.

A. eavesdroppingattack

B. clientattack

C. denial-of-service attack

D. hostattack

13. A__________attackinvolvesanadversaryrepeatingapreviouslycaptureduser response.

A.client

B.Trojanhorse

C. replay

D. eavesdropping

14. Aninstitutionthatissuesdebitcardstocardholdersandisresponsible forthe cardholder’saccountand authorizingtransactionsisthe_________.

A. cardholder

B. issuer

C. auditor

D.processor

15. __________allowsanissuertoaccessregionalandnationalnetworks that connectpointofsaledevicesandbanktellermachinesworldwide.

A. EFT

B. BTM

SHORT ANSWER QUESTIONS:

C. POS

D. ATF

1. Anauthenticationprocessconsistsofthe_________stepandtheverificationstep.

2. Voicepattern,handwritingcharacteristics,and typingrhythmareexamplesof __________biometrics.

3. A__________isaseparate filefromtheuser IDswherehashedpasswordsarekept.

4. Withthe__________policyauserisallowedtoselecttheirownpassword,butthe systemcheckstoseeifthepasswordisallowable.

ComputerSecurity:PrinciplesandPractice,3rd Edition Chapter3

5. Thetechnique fordevelopingan effectiveand efficientproactivepasswordchecker basedonrejectingwords onalistisbasedontheuseofa __________filter.

6. Objectsthatauserpossessesforthepurposeof userauthenticationare called______

7. Authenticationprotocolsusedwithsmarttokenscanbeclassifiedintothree categories: static,dynamicpassword generator,and___________.

8. A__________authenticationsystemattemptstoauthenticateanindividualbasedon hisorheruniquephysicalcharacteristics.

9. The__________isthepatternformedbyveins beneaththeretinalsurface.

10. Ahostgeneratedrandomnumberisoftencalleda__________.

11. __________,inthecontextofpasswords,referstoanadversary’s attempttolearn thepasswordbyobservingtheuser,findingawrittencopyofthepassword, orsome similarattackthatinvolvesthephysicalproximityofuserand adversary.

12. In a__________attack,anapplicationorphysicaldevicemasquerades asan authenticapplicationordeviceforthepurposeofcapturingauserpassword, passcode,orbiometric.

13. A__________attackattemptstodisableauserauthenticationservice byflooding theservice withnumerousauthenticationattempts.

14. A__________isanindividualtowhomadebitcardisissued.

15. The__________stepispresentingor generatingauthenticationinformationthat corroboratesthebindingbetweenthe entityandtheidentifier.

ComputerSecurity:PrinciplesandPractice,3rd Edition Chapter3

Chapter 3 – User Authentication Answer Key

TRUE/FALSE QUESTIONS:

Multiple Choice Questions:

Short Answer Questions:

ComputerSecurity:PrinciplesandPractice,3rd Edition Chapter3
1. T 2. T 3. F 4. T 5. F 6. T 7. T 8. F 9. T 10.T 11.F 12.T 13.T 14.F 15.T
1. A 2. C 3. B 4. C 5. D 6. B 7. A 8. C 9. D 10. B 11. A 12. D 13. C 14. B 15. A
ComputerSecurity:PrinciplesandPractice,3rd Edition Chapter3 1. identification 2. dynamic 3. shadowpassword file 4. complex password 5. Bloom 6. tokens 7. challenge-response 8. biometric 9. retinalpattern 10. nonce 11. Eavesdropping 12. Trojanhorse 13. denial-of-service 14. cardholder 15. verification Computer Security Principles And Practice Global 3rd Edition Stallings Test Bank Full Download: http://testbanktip.com/download/computer-security-principles-and-practice-global-3rd-edition-stallings-test-bank/ Download all pages and all chapters at: TestBankTip.com

Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.