Filters
Question type

Study Flashcards

Objects that a user possesses for the purpose of user authentication are called ______

Correct Answer

verifed

verified

An institution that issues debit cards to cardholders and is responsible for the cardholder's account and authorizing transactions is the _________.


A) cardholder
B) issuer
C) auditor
D) processor

Correct Answer

verifed

verified

Presenting or generating authentication information that corroborates the binding between the entity and the identifier is the ___________.


A) identification step
B) authentication step
C) verification step
D) corroboration step

Correct Answer

verifed

verified

User authentication is the basis for most types of access control and for user accountability.

Correct Answer

verifed

verified

A __________ is an individual to whom a debit card is issued.

Correct Answer

verifed

verified

A __________ attack involves an adversary repeating a previously captured user response.


A) client
B) Trojan horse
C) replay
D) eavesdropping

Correct Answer

verifed

verified

A good technique for choosing a password is to use the first letter of each word of a phrase.

Correct Answer

verifed

verified

A __________ is a separate file from the user IDs where hashed passwords are kept.

Correct Answer

verifed

verified

shadow pas...

View Answer

Voice pattern,handwriting characteristics,and typing rhythm are examples of __________ biometrics.

Correct Answer

verifed

verified

Depending on the application,user authentication on a biometric system involves either verification or identification.

Correct Answer

verifed

verified

__________ allows an issuer to access regional and national networks that connect point of sale devices and bank teller machines worldwide.


A) EFT
B) BTM
C) POS
D) ATF

Correct Answer

verifed

verified

An individual's signature is not unique enough to use in biometric applications.

Correct Answer

verifed

verified

A __________ authentication system attempts to authenticate an individual based on his or her unique physical characteristics.

Correct Answer

verifed

verified

A smart card contains an entire microprocessor.

Correct Answer

verifed

verified

The most common means of human-to-human identification are __________.


A) facial characteristics
B) retinal patterns
C) signatures
D) fingerprints

Correct Answer

verifed

verified

__________,in the context of passwords,refers to an adversary's attempt to learn the password by observing the user,finding a written copy of the password,or some similar attack that involves the physical proximity of user and adversary.

Correct Answer

verifed

verified

Authentication protocols used with smart tokens can be classified into three categories: static,dynamic password generator,and ___________.

Correct Answer

verifed

verified

The __________ strategy is when users are told the importance of using hard to guess passwords and provided with guidelines for selecting strong passwords.


A) reactive password checking
B) computer-generated password
C) proactive password checking
D) user education

Correct Answer

verifed

verified

T F 4.Many users choose a password that is too short or too easy to guess.

Correct Answer

verifed

verified

Memory cards store and process data.

Correct Answer

verifed

verified

Showing 21 - 40 of 45

Related Exams

Show Answer