Chapter #13 and 14/15

Is this your test? Login to manage it. If not, you can develop a quiz just like it.

This is a non-interactive preview of the quiz content.

1.
1 point
A ____ is a secret combination of letters, numbers, and/or characters that only the user should know.
2.
1 point
The weakness of passwords centers on ____.
3.
1 point
A(n) ____ can also capture transmissions that contain passwords.
4.
1 point
Due to the limitations of online guessing, most password attacks today use ____.
5.
1 point
The ____ attack will slightly alter dictionary words by adding numbers to the end of the password, spelling words backward, slightly misspelling words, or including special characters such as @, $, !, or %.
6.
1 point
Although brute force and dictionary attacks were once the primary tools used by attackers to crack an encrypted password, today attackers usually prefer ____.
7.
1 point
To create a rainbow table, each ____ begins with an initial password that is encrypted.
8.
1 point
____ can use fingerprints or other unique characteristics of a person’s face, hands, or eyes (irises and retinas) to authenticate a user.
9.
1 point
____ is the time it takes for a key to be pressed and then released.
10.
1 point
____ accepts spoken words for input as if they had been typed on the keyboard.
11.
1 point
If a user typically accesses his bank’s Web site from his home computer on nights and weekends, then this information can be used to establish a ____ of typical access.
12.
1 point
____ is related to the perception, thought process, and understanding of the user.
13.
1 point
It is predicted that ____ could become a key element in authentication in the future.
14.
1 point
____ is using a single authentication credential that is shared across multiple networks.
15.
1 point
____ holds the promise of reducing the number of usernames and passwords that users must memorize.
16.
1 point
Windows Live ID was originally designed as a ____ system that would be used by a wide variety of Web servers.
17.
1 point
____ permits users to share resources stored on one site with a second site without forwarding their authentication credentials to the other site.
18.
1 point
An operating system that has been reengineered so that it is designed to be secure from the ground up is known as a ____.
19.
1 point
Passwords provide strong protection.
20.
1 point
Token credentials can be revoked at any time by the user without affecting other token credentials issued to other sites.
21.
1 point
____ is text that has no formatting (such as bolding or underlining) applied.
22.
1 point
____ ensures that the information is correct and no unauthorized person or malicious software has altered that data.
23.
1 point
The most basic type of cryptographic algorithm is a ____ algorithm.
24.
1 point
____ takes plaintext of any length and creates a hash 128 bits long.
25.
1 point
In MD5, the length of a message is padded to ____ bits.
26.
1 point
____ is a relatively recent cryptographic hash function that has received international recognition and adoption by standards organizations, including the International Organization for Standardization (ISO).
27.
1 point
The simplest type of stream cipher is a ____ cipher.
28.
1 point
A ____ cipher rearranges letters without changing them.
29.
1 point
The____ is a symmetric cipher that was approved by the NIST in late 2000 as a replacement for DES.
30.
1 point
The algorithm ____ is a block cipher that operates on 64-bit blocks and can have a key length from 32 to 448 bits.
31.
1 point
____ encryption uses two keys instead of only one and these keys are mathematically related.
32.
1 point
The basis for a digital signature rests on the ability of ____ keys to work in both directions.
33.
1 point
The ____ algorithm is the most common asymmetric cryptography algorithm and is the basis for several products.
34.
1 point
____ attempts to use the unusual and unique behavior of microscopic objects to enable users to securely develop and share keys as well as to detect eavesdropping.
35.
1 point
NTRUEncrypt uses ____ cryptography that relies on a set of points in space.
36.
1 point
The ____ is essentially a chip on the motherboard of the computer that provides cryptographic services.
37.
1 point
Steganography can use image files, audio files, or even video files to contain hidden information.
38.
1 point
A hash that is created from a set of data can be reversed.
39.
1 point
Cryptography cannot be applied to entire disks.
40.
1 point
Self-encrypting HDD is commonly found in copiers and multifunction printers as well as point-of-sale systems used in government, financial, and medical environments.
41.
1 point
A(n) ____ serves as the trusted third-party agency that is responsible for issuing the digital certificates.
42.
1 point
The ____ function is a subordinate entity designed to handle specific CA tasks such as processing certificate requests and authenticating users.
43.
1 point
____ involves public-key cryptography standards, trust models, and key management.
44.
1 point
Digital signatures actually only show that the public key labeled as belonging to person was used to encrypt the digital signature.
45.
1 point
Public keys can be stored by embedding them within digital certificates, while private keys can be stored on the user’s local system.