If we are using an 4-character password that contains only lowercase English alphabetic characters (26 different characters), how many more possible
... [Show More] passwords are there if we use a 5-character password (still only lowercase English alphabetic characters?
a. 11,424,400 more possibilities
b. 26 more possibilities
c. Same number of possibilities because still using lowercase English alphabetic characters
d. 456,976 more possibilities
11,424,400 more possibilities
What do we call the process in which the client authenticates to the server and the server authenticates to the client?
a. Single Sign On
b. Biometric authentication
c. Mutual d.authentication
Verification
Mutual authentication
3. What do we call the rate at which we fail to authenticate legitimate users in a biometric system?
a. True Acceptance Rate (TAR)
b. False Acceptance Rate (FAR)
c. True Rejection Rate (TRR)
d.False Rejection Rate (FRR)
False Rejection Rate (FRR)
4. What is the difference between verification and authentication of an identity?
a. Verification is weaker confirmation of identity than authentication
b. Authentication always includes a biometric mechanism
c. Authentication is a weaker confirmation of identity than verification
d. Nothing- they mean the same thing
Verification is weaker confirmation of identity than authentication
5. What biometric factor describes how well a characteristic resists change over time?
a. Universality
b. Permanence
c. Uniqueness
d.Circumvention
Permanence
6. Which of the following is not true?
a. Voice authentication requires speech to text capability
b. Facial recognition may be used for authentication
c. The human iris is unique to an individual
d.Fingerprints have features such bifurcations, islands and crossovers
Voice authentication requires speech to text capability
7. A physical key (like for a door lock) would be described as which type of authentication factor?
a. Something you bought
b. Something you made
c. Something you have
d. Something you stole
Something you have
8. Which of the following is not a reason why an identity card alone might not make an ideal method of authentication?
a. May be spoofed
b. May be duplicated
c. Subject to change
d. Issued by the government
Issued by the government
9. If we are using an identity card such as a driver's license as the basis for our authentication scheme, which of the following additions would not represent multifactor authentication?
a. A fingerprint
b. A PIN (personal identification number)
c. A voice print
d. A birth certificate
A birth certificate
10. In the fake finger video from class, what was the printed circuit board used for?
a. To capture a fingerprint from a camera application
b. To etch the fingerprint
c. To build a circuit to bypass the phone's authentication program
d.To write code that simulated the fingerprint
To etch the fingerprint
Question 1
What is the difference between Mandatory Access Control (MAC) and Discretionary Access Control (DAC)?
a. In MAC, resource access is logged; in DAC, resource access is not logged
b. In DAC, the owner can only Delete the resource; in MAC, the owner can only Make (create) the resource
c. In MAC, the owner of the resource determines access; in DAC, the owner of the resource does not determines access
d. In DAC, the owner of the resource determines access; in MAC, the owner of the resource does not determines access
d. In DAC, the owner of the resource determines access; in MAC, the owner of the resource does not determines access [Show Less]