Term
| The OSI model breaks networking steps down into a series of six layers. |
|
Definition
|
|
Term
| Security is enhanced by subnetting a single network into multiple smaller subnets in order to isolate groups of hosts. |
|
Definition
|
|
Term
| A ____ is a network device that can forward packets across computer networks. |
|
Definition
|
|
Term
| Layer 5 of the OSI model is the ____ layer. |
|
Definition
|
|
Term
| ____ is typically used on home routers that allow multiple users to share one IP address received from an Internet service provider (ISP). |
|
Definition
|
|
Term
| ____ is a technique that allows private IP addresses to be used on the public Internet. |
|
Definition
|
|
Term
A(n) ____ can block malicious content in “real time” as it appears without first knowing the URL of a dangerous site.
|
|
Definition
|
|
Term
| The OSI model breaks networking steps down into a series of six layers. |
|
Definition
|
|
Term
| Security is enhanced by subnetting a single network into multiple smaller subnets in order to isolate groups of hosts. |
|
Definition
|
|
Term
| A ____ allows scattered users to be logically grouped together even though they may be attached to different switches. |
|
Definition
|
|
Term
| A ____ is a standard network device for connecting multiple Ethernet devices together by using twisted-pair copper or fiber-optic cables in order to make them function as a single network segment. |
|
Definition
|
|
Term
| ____ is a technology that can help to evenly distribute work across a network. |
|
Definition
|
|
Term
| ____ switches are connected directly to the devices on a network. |
|
Definition
|
|
Term
| In order to allow untrusted outside users access to resources such as Web servers, most networks employ a ____. |
|
Definition
|
|
Term
| ____ IP addresses are IP addresses that are not assigned to any specific user or organization. |
|
Definition
|
|
Term
| Workgroup switches must work faster than core switches. |
|
Definition
|
|
Term
| A basic level of security can be achieved through using the security features found in network hardware. |
|
Definition
|
|
Term
| Layer 3 of the OSI model is the ____ layer. |
|
Definition
|
|
Term
| Examining network traffic, activity, transactions, or behavior and looking for well-known patterns is known as ____-based monitoring |
|
Definition
|
|
Term
| ____ provides remote users with the same access and functionality as local users through a VPN or dial-up connection. |
|
Definition
|
|
Term
| Behavior-based monitoring attempts to overcome the limitations of both anomaly-based monitoring and signature-based monitoring by being more adaptive and proactive instead of reactive. |
|
Definition
|
|
Term
| A ____ is a computer or an application program that intercepts a user request from the internal secure network and then processes that request on behalf of the user. |
|
Definition
|
|
Term
| IP addresses are ____-bit addresses. |
|
Definition
|
|
Term
| ___ keeps a record of the state of a connection between an internal computer and an external device and then makes decisions based on the connection as well as the conditions. |
|
Definition
|
|
Term
| A(n) ____ does not serve clients, but instead routes incoming requests to the correct server. |
|
Definition
|
|
Term
| Each operation in a computing environment starts with a ____. |
|
Definition
|
|
Term
| A(n) ____ encrypts all data that is transmitted between the remote device and the network. |
|
Definition
|
|
Term
| A(n) ____ is the end of the tunnel between VPN devices. |
|
Definition
|
|
Term
Used to classify standard network devices based on their function
a.OSI model
b.DMZ
c.VLAN
d.HIDS
e.Remote access
f.Subnet addressing
g.PAT
h.NAT
i.Baseline
|
|
Definition
|
|
Term
A reference set of data against which operational data is compared
a.OSI model
b.DMZ
c.VLAN
d.HIDS
e.Remote access
f.Subnet addressing
g.PAT
h.NAT
i.Baseline
|
|
Definition
|
|
Term
A software-based application that runs on a local host computer that can detect an attack as it occurs
a.OSI model
b.DMZ
c.VLAN
d.HIDS
e.Remote access
f.Subnet addressing
g.PAT
h.NAT
i.Baseline
|
|
Definition
|
|
Term
Each outgoing packet is given a different IP address
a.OSI model
b.DMZ
c.VLAN
d.HIDS
e.Remote access
f.Subnet addressing
g.PAT
h.NAT
i.Baseline
|
|
Definition
|
|
Term
Each packet is given the same IP address but a different TCP port number.
a.OSI model
b.DMZ
c.VLAN
d.HIDS
e.Remote access
f.Subnet addressing
g.PAT
h.NAT
i.Baseline
|
|
Definition
|
|
Term
Functions as a separate network that rests outside the secure network perimeter
a.OSI model
b.DMZ
c.VLAN
d.HIDS
e.Remote access
f.Subnet addressing
g.PAT
h.NAT
i.Baseline
|
|
Definition
|
|
Term
Allows an IP address to be split anywhere within its 32 bits
a.OSI model
b.DMZ
c.VLAN
d.HIDS
e.Remote access
f.Subnet addressing
g.PAT
h.NAT
i.Baseline
|
|
Definition
|
|
Term
Segmenting a network by separating devices into logical groups
a.OSI model
b.DMZ
c.VLAN
d.HIDS
e.Remote access
f.Subnet addressing
g.PAT
h.NAT
i.Baseline
|
|
Definition
|
|
Term
Refers to any combination of hardware and software that enables remote users to access a local internal network
a.OSI model
b.DMZ
c.VLAN
d.HIDS
e.Remote access
f.Subnet addressing
g.PAT
h.NAT
i.Baseline
|
|
Definition
|
|
Term
| In the ____ model, the cloud computing vendor provides access to the vendor’s software applications running on a cloud infrastructure. |
|
Definition
| Cloud Software as a Service |
|
|
Term
| ___ is a pay-per-use computing model in which customers pay only for the computing resources they need.Cloud computing |
|
Definition
|
|
Term
| Server virtualization typically relies on the ____, which is software that runs on a physical computer to manage one or more virtual machine operating systems. |
|
Definition
|
|
Term
| TCP/IP uses its own five-layer architecture that includes Network Interface, Internet, Control, Transport, and Application. |
|
Definition
|
|
Term
| IP is the protocol that functions primarily at the Open Systems Interconnection (OSI) ____. |
|
Definition
|
|
Term
| SNMP agents are protected with a password known as a(n) ____ in order to prevent unauthorized users from taking control over a device. |
|
Definition
|
|
Term
| __ is used to relay query messages. |
|
Definition
|
|
Term
| A ____ forwards packets across computer networks |
|
Definition
|
|
Term
| DNS poisoning can be prevented by using the latest editions of the DNS software known as ____. |
|
Definition
|
|
Term
| TCP is the main ____ protocol that is responsible for establishing connections and the reliable data transport between devices. |
|
Definition
|
|
Term
| Routers operate at the ____ Layer. |
|
Definition
|
|
Term
| ____ provides a greater degree of security by implementing port-based authentication. |
|
Definition
|
|
Term
IEEE 802.1x is commonly used on wireless networks.
|
|
Definition
|
|
Term
| ____ can be used to determine whether new IP addresses are attempting to probe the network. |
|
Definition
|
|
Term
| In the ____ cloud computing model, the customer has the highest level of control. |
|
Definition
| Cloud Infrastructure as a Service |
|
|
Term
| A ____ is a feature that controls a device’s tolerance for unanswered service requests and helps to prevent a DoS attack. |
|
Definition
|
|
Term
| IP telephony and Voice over IP (VoIP) are identical. |
|
Definition
|
|
Term
| The ____ is a database, organized as a hierarchy or tree, of the name of each site on the Internet and its corresponding IP number. |
|
Definition
|
|
Term
| Broadcast storms can be prevented with ____. |
|
Definition
|
|
Term
| Despite its promise to dramatically impact IT, cloud computing raises significant security concerns. |
|
Definition
|
|
Term
| ____ is a means of managing and presenting computer resources by function without regard to their physical layout or location. |
|
Definition
|
|
Term
| TCP is responsible for addressing packets and sending them on the correct route to the destination, while IP is responsible for reliable packet transmission. |
|
Definition
|
|
Term
| The most common protocol suite used today for local area networks (LANs) as well as the Internet is ____. |
|
Definition
|
|
Term
| It is possible to segment a network by physical devices grouped into logical units through a(n) ____. |
|
Definition
|
|
Term
| TCP port ____ is the FTP control port used for passing FTP commands. |
|
Definition
|
|
Term
| A ____ can create entries in a log for all queries that are received. |
|
Definition
|
|
Term
Used by devices to communicate updates or error information to other devices
a.IP telephony
b.Smurf DoS attack
c.Network discovery
d.Ping of Death
e.ICMP
f.STA
g.SNMP
h.DNS
i.DNS poisoning
|
|
Definition
|
|
Term
An attacker can use ICMP messages as one of the first steps in reconnaissance to discover information about the hosts that are part of the network
a.IP telephony
b.Smurf DoS attack
c.Network discovery
d.Ping of Death
e.ICMP
f.STA
g.SNMP
h.DNS
i.DNS poisoning
|
|
Definition
|
|
Term
Attackers can broadcast a ping request to all computers on the network but change the address from which the request came to that of the target
a.IP telephony
b.Smurf DoS attack
c.Network discovery
d.Ping of Death
e.ICMP
f.STA
g.SNMP
h.DNS
i.DNS poisoning
|
|
Definition
|
|
Term
A malformed ping using ICMP is sent to the victim’s computer that exceeds the size of an IP packet
a.IP telephony
b.Smurf DoS attack
c.Network discovery
d.Ping of Death
e.ICMP
f.STA
g.SNMP
h.DNS
i.DNS poisoning
|
|
Definition
|
|
Term
31
Functions by exchanging management information between networked devices
a.IP telephony
b.Smurf DoS attack
c.Network discovery
d.Ping of Death
e.ICMP
f.STA
g.SNMP
h.DNS
i.DNS poisoning
|
|
Definition
|
|
Term
32
A TCP/IP protocol that resolves (maps) an IP address with its equivalent symbolic name
a.IP telephony
b.Smurf DoS attack
c.Network discovery
d.Ping of Death
e.ICMP
f.STA
g.SNMP
h.DNS
i.DNS poisoning
|
|
Definition
|
|
Term
33
Substitutes addresses so that the computer is automatically redirected to another device
a.IP telephony
b.Smurf DoS attack
c.Network discovery
d.Ping of Death
e.ICMP
f.STA
g.SNMP
h.DNS
i.DNS poisoning
|
|
Definition
|
|
Term
Can determine that a switch has multiple ways to communicate with a host and then determine the best path while blocking out other paths
a.IP telephony
b.Smurf DoS attack
c.Network discovery
d.Ping of Death
e.ICMP
f.STA
g.SNMP
h.DNS
i.DNS poisoning
|
|
Definition
|
|
Term
Using a data-based OP network to add digital voice clients and new voice applications onto the IP network
a.IP telephony
b.Smurf DoS attack
c.Network discovery
d.Ping of Death
e.ICMP
f.STA
g.SNMP
h.DNS
i.DNS poisoning
|
|
Definition
|
|
Term
| ____ access points are serious threats to network security because they allow attackers to intercept the RF signal and bypass network security to attack the network or capture sensitive data. |
|
Definition
|
|
Term
| ___ is an attack that accesses unauthorized information from a wireless device through a Bluetooth connection, often between cell phones and laptop computers. |
|
Definition
|
|
Term
| Because antennas are generally positioned to provide the broadest area of coverage, APs should be located at the end of the coverage area. |
|
Definition
|
|
Term
| ___ is designed to detect any changes in a packet, whether accidental or intentional. |
|
Definition
|
|
Term
| Bluetooth devices are not backward compatible with previous versions. |
|
Definition
|
|
Term
| The SSID can generally be any alphanumeric string from 2 to ___ characters. |
|
Definition
|
|
Term
| A ____ access point is an unauthorized AP that allows an attacker to bypass many of the network security configurations and opens the network and its users to attacks. |
|
Definition
|
|
Term
| The IEEE 802.15.1-2005 Wireless Personal Area Network standard was based on the ____ specifications. |
|
Definition
|
|
Term
| ____ is an attack that sends unsolicited messages to Bluetooth-enabled devices. |
|
Definition
|
|
Term
| Because PEAP can be vulnerable to specific types of attacks, Cisco now recommends that users migrate to a more secure EAP than PEAP. |
|
Definition
|
|
Term
| ___ is the encryption protocol standard for WPA2. |
|
Definition
|
|
Term
| ____ requires mutual authentication used for WLAN encryption using Cisco client software. |
|
Definition
|
|
Term
| A(n) ____ acts as the “base station” for the wireless network. |
|
Definition
|
|
Term
| EAP request packets are issued by the ____. |
|
Definition
|
|
Term
| When a device receives a beacon frame from an AP, the device then sends a frame known as a(n) ____ frame to the AP. |
|
Definition
|
|
Term
| An ____ is an AP that is set up by an attacker. |
|
Definition
|
|
Term
| ____ allow a single access point to service different types of users. |
|
Definition
|
|
Term
| Bluetooth is a ____ technology designed for data communication over short distances. |
|
Definition
|
|
Term
| Most Bluetooth devices use a Class 2 radio that has a range of ____ feet. |
|
Definition
|
|
Term
| APs use antennas that radiate a signal in all directions. |
|
Definition
|
|
Term
| A group of piconets in which connections exist between different piconets is called a ____. |
|
Definition
|
|
Term
| Slave devices that are connected to the piconet and are sending transmissions are known as ____ slaves. |
|
Definition
|
|
Term
| ____ is considered a more flexible EAP scheme because it creates an encrypted channel between the client and the authentication server. |
|
Definition
|
|
Term
| ___ is a framework for transporting authentication protocols instead of the authentication protocol itself. |
|
Definition
|
|
Term
| Because of the weaknesses of WEP, it is possible for an attacker to identify two packets derived from the same IV. |
|
Definition
|
|
Term
A wireless technology that uses short-range radio frequency (RF) transmissions and provides for rapid ad hoc device pairings
a.War chalking
b.Bluetooth
c.Protected EAP
d.War driving
e.Initialization
f.TKIP
g.Lightweight EAP
h.SSID
i.Evil twin
|
|
Definition
|
|
Term
An AP set up by an attacker to mimic an authorized AP and capture transmissions
a.War chalking
b.Bluetooth
c.Protected EAP
d.War driving
e.Initialization
f.TKIP
g.Lightweight EAP
h.SSID
i.Evil twin
|
|
Definition
|
|
Term
A 24-bit value used in WEP that changes each time a packet is encrypted
a.War chalking
b.Bluetooth
c.Protected EAP
d.War driving
e.Initialization
f.TKIP
g.Lightweight EAP
h.SSID
i.Evil twin
|
|
Definition
|
|
Term
Searching for wireless signals from an automobile or on foot using a portable computing device
a.War chalking
b.Bluetooth
c.Protected EAP
d.War driving
e.Initialization
f.TKIP
g.Lightweight EAP
h.SSID
i.Evil twin
|
|
Definition
|
|
Term
The process of documenting and then advertising the location of wireless LANs for others to use
a.War chalking
b.Bluetooth
c.Protected EAP
d.War driving
e.Initialization
f.TKIP
g.Lightweight EAP
h.SSID
i.Evil twin
|
|
Definition
|
|
Term
The user-supplied network name of a WLAN
a.War chalking
b.Bluetooth
c.Protected EAP
d.War driving
e.Initialization
f.TKIP
g.Lightweight EAP
h.SSID
i.Evil twin
|
|
Definition
|
|
Term
A WPA encryption technology
a.War chalking
b.Bluetooth
c.Protected EAP
d.War driving
e.Initialization
f.TKIP
g.Lightweight EAP
h.SSID
i.Evil twin
|
|
Definition
|
|
Term
A proprietary EAP method developed by Cisco Systems
a.War chalking
b.Bluetooth
c.Protected EAP
d.War driving
e.Initialization
f.TKIP
g.Lightweight EAP
h.SSID
i.Evil twin
|
|
Definition
|
|
Term
Designed to simplify the deployment of 802.1x by using Microsoft Windows logins and passwords
a.War chalking
b.Bluetooth
c.Protected EAP
d.War driving
e.Initialization
f.TKIP
g.Lightweight EAP
h.SSID
i.Evil twin
|
|
Definition
|
|
Term
| TACACS+ and RADIUS are designed to support hundreds of remote connections. |
|
Definition
|
|
Term
| ____ is often used for managing user access to one or more systems. |
|
Definition
| Rule Based Access Control |
|
|
Term
| The most restrictive access control model is ____. |
|
Definition
|
|
Term
| A computer user may be authorized or granted permission to log on to a system by presenting valid credentials, yet that authorization does not mean that the user can then access any and all resources. |
|
Definition
|
|
Term
| ____ is suitable for what are called “high-volume service control applications” such as dial-in access to a corporate network. |
|
Definition
|
|
Term
| ____ indicates when an account is no longer active. |
|
Definition
|
|
Term
| Authorization and access are viewed as synonymous and in access control, they are the same step. |
|
Definition
|
|
Term
| ____ attacks may allow an attacker to construct LDAP statements based on user input statements. |
|
Definition
|
|
Term
| A user accessing a computer system must present credentials or ____ when logging on to the system. |
|
Definition
|
|
Term
| A user under Role Based Access Control can be assigned only one ____. |
|
Definition
|
|
Term
| A(n) ____ is a set of permissions that are attached to an object. |
|
Definition
|
|
Term
| The ____ model is the least restrictive. |
|
Definition
|
|
Term
| During RADIUS authentication the AP, serving as the authenticator that will accept or reject the wireless device, creates a data packet from this information called the ____. |
|
Definition
|
|
Term
| In the UAC dialog boxes, the color ____ indicates the lowest risk. |
|
Definition
|
|
Term
| A shield icon warns users if they attempt to access any feature that requires UAC permission. |
|
Definition
|
|
Term
| The X.500 standard defines a protocol for a client application to access an X.500 directory called ____. |
|
Definition
|
|
Term
| ____ is an authentication service commonly used on UNIX devices that communicates by forwarding user authentication information to a centralized server. |
|
Definition
|
|
Term
| A(n) ____ model is a standard that provides a predefined framework for hardware and software developers who need to implement access control in their devices or applications. |
|
Definition
|
|
Term
| ____ requires that if the fraudulent application of a process could potentially result in a breach of security, then the process should be divided between two or more individuals. |
|
Definition
|
|
Term
| ____ requires that if the fraudulent application of a process could potentially result in a breach of security, then the process should be divided between two or more individuals. |
|
Definition
|
|
Term
| A user or a process functioning on behalf of the user that attempts to access an object is known as the ____. |
|
Definition
|
|
Term
| ____ accounts are user accounts that remain active after an employee has left an organization. |
|
Definition
|
|
Term
| ____ is an authentication system developed by the Massachusetts Institute of Technology (MIT) and used to verify the identity of networked users. |
|
Definition
|
|
Term
| The strength of RADIUS is that messages are always directly sent between the wireless device and the RADIUS server. |
|
Definition
|
|
Term
| The action that is taken by the subject over the object is called a(n) ____. |
|
Definition
|
|
Term
| ____ is considered a more “real world” access control than the other models because the access is based on a user’s job function within an organization. |
|
Definition
| Role Based Access Control |
|
|
Term
Granting permission to take an action
a.Authorization
b.Custodian
c.Access
d.Object
e.Identification
f.Owner
g.Directory service
h.Authentication
i.End user
|
|
Definition
|
|
Term
A review of credentials
a.Authorization
b.Custodian
c.Access
d.Object
e.Identification
f.Owner
g.Directory service
h.Authentication
i.End user
|
|
Definition
|
|
Term
Validating credentials as genuine
a.Authorization
b.Custodian
c.Access
d.Object
e.Identification
f.Owner
g.Directory service
h.Authentication
i.End user
|
|
Definition
|
|
Term
The right given to access
a.Authorization
b.Custodian
c.Access
d.Object
e.Identification
f.Owner
g.Directory service
h.Authentication
i.End user
|
|
Definition
|
|
Term
A specific resource, such as a file or a hardware device
a.Authorization
b.Custodian
c.Access
d.Object
e.Identification
f.Owner
g.Directory service
h.Authentication
i.End user
|
|
Definition
|
|
Term
Person responsible for the information
a.Authorization
b.Custodian
c.Access
d.Object
e.Identification
f.Owner
g.Directory service
h.Authentication
i.End user
|
|
Definition
|
|
Term
Individual to whom day-to-day actions have been assigned
a.Authorization
b.Custodian
c.Access
d.Object
e.Identification
f.Owner
g.Directory service
h.Authentication
i.End user
|
|
Definition
|
|
Term
User who accesses information in the course of routine job responsibilities
a.Authorization
b.Custodian
c.Access
d.Object
e.Identification
f.Owner
g.Directory service
h.Authentication
i.End user
|
|
Definition
|
|
Term
A database stored on the network itself that contains information about users and network devices
a.Authorization
b.Custodian
c.Access
d.Object
e.Identification
f.Owner
g.Directory service
h.Authentication
i.End user
|
|
Definition
|
|
Term
| ____ is the time it takes for a key to be pressed and then released. |
|
Definition
|
|
Term
| Windows Live ID was originally designed as a ____ system that would be used by a wide variety of Web servers. |
|
Definition
federated identity management |
|
|
Term
| If a user typically accesses his bank’s Web site from his home computer on nights and weekends, then this information can be used to establish a ____ of typical access. |
|
Definition
|
|
Term
| Using a rainbow table to crack a password requires three steps. |
|
Definition
|
|
Term
| Although brute force and dictionary attacks were once the primary tools used by attackers to crack an encrypted password, today attackers usually prefer ____. |
|
Definition
|
|
Term
| A ____ is a secret combination of letters, numbers, and/or characters that only the user should know. |
|
Definition
|
|
Term
| Trusted OSs have been used since the late 1960s, initially for government and military applications. |
|
Definition
|
|
Term
| ___ accepts spoken words for input as if they had been typed on the keyboard. |
|
Definition
|
|
Term
| Today’s operating systems have roots dating back 20 or more years, well before security was identified as a critical process. |
|
Definition
|
|
Term
| ____ is using a single authentication credential that is shared across multiple networks. |
|
Definition
|
|
Term
| ___ attack is where every possible combination of letters, numbers, and characters is used to create encrypted passwords. |
|
Definition
|
|
Term
| It is predicted that ____ could become a key element in authentication in the future. |
|
Definition
|
|
Term
| ____ permits users to share resources stored on one site with a second site without forwarding their authentication credentials to the other site. |
|
Definition
|
|
Term
| The set of letters, symbols, and characters that make up the password are known as a ____ set. |
|
Definition
|
|
Term
| ____ can use fingerprints or other unique characteristics of a person’s face, hands, or eyes (irises and retinas) to authenticate a user. |
|
Definition
|
|
Term
| The ____ attack will slightly alter dictionary words by adding numbers to the end of the password, spelling words backward, slightly misspelling words, or including special characters such as @, $, !, or % |
|
Definition
|
|
Term
| To create a rainbow table, each ____ begins with an initial password that is encrypted. |
|
Definition
|
|
Term
| The weakness of passwords centers on ____. |
|
Definition
|
|
Term
| Passwords provide strong protection. |
|
Definition
|
|
Term
| Microsoft is Windows ____ is a feature of Windows that is intended to provide users with control of their digital identities while helping them to manage privacy. |
|
Definition
|
|
Term
| ____ is related to the perception, thought process, and understanding of the user. |
|
Definition
|
|
Term
| Due to the limitations of online guessing, most password attacks today use ____. |
|
Definition
|
|
Term
| Token credentials can be revoked at any time by the user without affecting other token credentials issued to other sites. |
|
Definition
|
|
Term
| ____ holds the promise of reducing the number of usernames and passwords that users must memorize. |
|
Definition
|
|
Term
| A(n) ____ can also capture transmissions that contain passwords. |
|
Definition
|
|
Term
| An operating system that has been reengineered so that it is designed to be secure from the ground up is known as a ____. |
|
Definition
|
|
Term
A password attack in which every possible combination of letters, numbers, and characters is used to create encrypted passwords that are matched with those in a stolen password file
a.Standard biometrics
b.CAC
c.Account Lockout Policy
d.Token
e.Brute Force
f.Rainbow tables
g.Behavioral biometrics
h.PIV
i.Hybrid |
|
Definition
|
|
Term
Make password attacks easier by creating a large pregenerated data set of encrypted passwords
a.Standard biometrics
b.CAC
c.Account Lockout Policy
d.Token
e.Brute Force
f.Rainbow tables
g.Behavioral biometrics
h.PIV
i.Hybrid
|
|
Definition
|
|
Term
A Department of Defense (DoD) smart card used for identification for active-duty and reserve military personnel along with civilian employees and special contractors
a.Standard biometrics
b.CAC
c.Account Lockout Policy
d.Token
e.Brute Force
f.Rainbow tables
g.Behavioral biometrics
h.PIV
i.Hybrid
|
|
Definition
|
|
Term
A government standard for smart cards that covers all government employees
a.Standard biometrics
b.CAC
c.Account Lockout Policy
d.Token
e.Brute Force
f.Rainbow tables
g.Behavioral biometrics
h.PIV
i.Hybrid
|
|
Definition
|
|
Term
A small device that can be affixed to a keychain with a window display that shows a code to be used for authentication
a.Standard biometrics
b.CAC
c.Account Lockout Policy
d.Token
e.Brute Force
f.Rainbow tables
g.Behavioral biometrics
h.PIV
i.Hybrid
|
|
Definition
|
|
Term
Using fingerprints or other unique physical characteristics of a person’s face, hands, or eyes for authentication
a.Standard biometrics
b.CAC
c.Account Lockout Policy
d.Token
e.Brute Force
f.Rainbow tables
g.Behavioral biometrics
h.PIV
i.Hybrid
|
|
Definition
|
|
Term
Authenticating a user by the normal actions that the user performs
a.Standard biometrics
b.CAC
c.Account Lockout Policy
d.Token
e.Brute Force
f.Rainbow tables
g.Behavioral biometrics
h.PIV
i.Hybrid
|
|
Definition
|
|
Term
A password attack that slightly alters dictionary words by adding numbers to the end of the password, spelling words backward, slightly misspelling words, or including special characters
a.Standard biometrics
b.CAC
c.Account Lockout Policy
d.Token
e.Brute Force
f.Rainbow tables
g.Behavioral biometrics
h.PIV
i.Hybrid
|
|
Definition
|
|
Term
Prevents a logon after a set number of failed logon attempts within a specified period
a.Standard biometrics
b.CAC
c.Account Lockout Policy
d.Token
e.Brute Force
f.Rainbow tables
g.Behavioral biometrics
h.PIV
i.Hybrid
|
|
Definition
|
|