What Type Of Password Is Maryhadalittlelamb
Question: Which of the following are examples of Something You Have authentication controls? (Select two.)
Answer: Smart cardPhoto IDSomething You Have authentication controls include physical items that you have on your possession, such as a smart card, photo ID, token device, or swipe card.Something You Know authentication requires you to provide a password, PIN, pass phrase, or the answer to a cognitive question (such as your mother's maiden name).Something You Are authentication uses a biometric system, such as a fingerprint, retina scan, voice recognition, keyboard, or writing recognition.
Question: Which of the following identification and authentication factors are often well known or easily discovered by others on the same network or system?
Answer: UsernameThe username is typically the least protected identification and authentication factor. Therefore, usernames are often well known or easy to discover, especially by others on the same network or system. The key to maintaining a secure environment is to keep authentication factors secret. Often, usernames are constructed using a standard naming convention, such as first and middle initials plus the full last name, or the first name and last name separated by a period. If these simple construction conventions are known, building usernames from an employee list is very simple.Passwords, your PGP secret key, and your biometric reference profile are less likely to be well known or easy to discover.
Question: Which of the following is a password that relates to things that people know, such as a mother's maiden name or a pet's name?
Answer: CognitiveCognitive passwords relate to things that people know, such as a mother's maiden name or a pet's name.Dynamic passwords change upon each consecutive login.One-time passwords are only valid for a single use.A passphrase is a password long enough to be a phrase.
Question: What type of password is maryhadalittlelamb?
Answer: PassphraseA passphrase is a password long enough to be a phrase, such as maryhadalittlelamb.Cognitive passwords relate to things that people know, such as a mother's maiden name or a pet's name,A static password is created by a user and overseen by an administrator.Composition passwords are created by the system and are usually two or more unrelated words divided by symbols on the keyboard.
Question: Match the authentication factor types on the left with the appropriate authentication factor on the right. Each authentication factor type may be used more than once.
Answer: PINSomething You KnowSmart CardSomething You HavePasswordSomething You KnowRetina ScanSomething You AreFingerprint ScanSomething You AreHardware TokenSomething You HavePassphraseSomething You KnowVoice RecognitionSomething You AreWi-Fi TriangulationSomewhere You AreTyping BehaviorsSomething You DoSomething You Know authentication requires you to provide a password or some other data that you know. This is the weakest type of authentication. Examples of Something You Know authentication controls include:> Passwords, codes, or IDs> PINs> Passphrases (long multi-word passwords)Something You Have (also called token-based authentication) is authentication based on something users have in their possession. Examples of Something You Have controls include:> Swipe cards> Photo IDs> Smart cards> Hardware tokensSomething You Are authentication uses a biometric system. A biometric system attempts to identify a person based on metrics or a mathematical representation of the subject's biological attribute. Biometric systems are the most expensive and least accepted system type, but are generally considered the most secure form of authentication. Common attributes used for biometric systems include:> Fingerprints> Hand topology (side view) or geometry (top-down view)> Palm scans> Retina scans> Iris scans> Facial scans> Voice recognitionSomewhere You Are authentication (also known as geolocation) is a supplementary authentication factor that uses physical location to verify a user's identity. Examples of implementations include:> An account is locked unless the user has passed through the building's entrance using an ID card.> If the user is within RFID range of the workstation, authentication requests are allowed.> GPS or Wi-Fi triangulation location data is used to determine a device's location. If the user and the device are in a specified location, authentication requests are allowed. If not, the device is locked.Something You Do is a supplementary authentication factor that requires an action to verify a user's identity. Example implementations include:> Analyzing a user's handwriting sample against a baseline sample before allowing authentication.> Analyzing a user's typing behaviors against a baseline sample before allowing authentication.
Question: A smart card can be used to store all but which of the following items?
Answer: Biometric template originalA smart card cannot store biometric template originals, as those are physical components of the human body.A smart card can store digital signatures, cryptography keys, and identification codes.
Question: Which of the following are disadvantages of biometrics? (Select two.)
Answer: When used alone, they are no more secure than a strong password.They have the potential to produce numerous false negatives.When a biometric is used by itself, it is no more secure than a strong password. A single successful attack can subvert a biometric in much the same way that a single successful attack can subvert a password. Biometric attacks need not be based on physical harm (such as cutting off a finger), but can include a wide variety of realistic reproductions that fool the biometric reader device.When a biometric device's sensitivity is set too high, it results in numerous false rejections (when authorized users are not recognized and are therefore rejected).The advantage of biometrics is that no two people have the same biometric characteristics. Most characteristics, such as retinal patterns, are unique, even among identical twins. A password can be discovered using a brute force attack, but there is no such attack against biometrics.
Question: What is the MOST important aspect of a biometric device?
Answer: AccuracyThe most important aspect of a biometric device is accuracy. If an access control device is not accurate, it does not offer reliable security.Enrollment time is how long it takes for a new user to be defined in the biometric database. Typically, an enrollment time less than two minutes is preferred. The size of the reference profile is irrelevant in most situations. Throughput is how many users a biometric device can scan and verify within a given time period. Typically, a throughput of 10 users per minute is preferred.
Question: Which of the following defines the crossover error rate for evaluating biometric systems?
Answer: The point where the number of false positives matches the number of false negatives in a biometric system.The crossover error rate, or the equal error rate, is the point where the number of false positives matches the number of false negatives in a biometric system.A false negative (or Type I error) occurs when a person who should be allowed access is denied access.A false positive (or Type II error) occurs when a person who should be denied access is allowed access.The processing rate, or system throughput, identifies the number of subjects or authentication attempts that can be validated.
Question: Which of the following terms is used to describe an event in which a person who should be allowed access is denied access to a system?
Answer: False negativeA false negative occurs when a person who should be allowed access is denied access.A false positive occurs when a person who should be denied access is allowed access.The processing rate, or system throughput, identifies the number of subjects or authentication attempts that can be validated.The crossover error rate, also called the equal error rate, is the point where the number of false positives matches the number of false negatives in a biometric system.