100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
ITN 262 Chapter 6 Test Questions and Answers All Correct $13.49   Add to cart

Exam (elaborations)

ITN 262 Chapter 6 Test Questions and Answers All Correct

 0 view  0 purchase
  • Course
  • ITN 262
  • Institution
  • ITN 262

ITN 262 Chapter 6 Test Questions and Answers All Correct Hash functions play such a fundamental cybersecurity role that the US government has published a series of standards for them. These are called the? - Answer- Secure Hash Algorithms (SHA) The Secure Hash Algorithms are published in the...

[Show more]

Preview 2 out of 6  pages

  • October 10, 2024
  • 6
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • ITN 262
  • ITN 262
avatar-seller
Scholarsstudyguide
ITN 262 Chapter 6 Test Questions
and Answers All Correct
Hash functions play such a fundamental cybersecurity role that the US government has
published a series of standards for them. These are called the? - Answer- Secure Hash
Algorithms (SHA)

The Secure Hash Algorithms are published in the? - Answer- Federal Information
Processing Standards 180 series.

Can detect minor changes in enormous blocks of data, like programs downloaded from
the internet. - Answer- one way hash

The most powerful modern attack on passwords is the _____ attack, which attacks
hashed passwords. We also call this password cracking. - Answer- Offline attack

Our first step in measuring the strength of our password system is to count the total
number of possible passwords. We call this the? - Answer- Search Space

The search space provides the ______ _______ for the number of guesses required in
a trial-and-error attack. - Answer- upper bound

To increase the search space we have two options, they are? - Answer- Increase the
length - L

Increase the range of letters and other characters in the password's alphabet -A

When we measure the uncertainty in the value of a data item, we measure its
________. - Answer- entropy

_______ in data indicates the likelihood that a particular message may appear.
- it considers the range of possible messages and the likelihood of each one. - Answer-
Entropy

When people are ____ in their password selection, they choose passwords from only
part of the total possible search space. - Answer- bias

Three types of tokens are? - Answer- Passive Tokens

Challenge-response Tokens

, One-time password Tokens

transmits the same credential every time. these are a physical substitute for a
password. The base secret they carry usually is impractical for users to memorize. -
Answer- Passive Tokens

Transmits credentials that vary according to an unpredictable "Challenge" from the
computer - Answer- Challenge-response tokens

Transmits different credentials based on an internal clock or counter - Answer- one-time
password tokens

Challenge and One-time password tokens are also called? - Answer- active tokens

they produce a different credential every time we use them. - Answer- active token

credit cards and ATM cards are examples of what kind of token? - Answer- passive
token

The fraction of readings that should match an existing credential template but do not
match it. - Answer- False rejection rate (FRR)

The fraction of readings that match an existing credential template but should not match
it. - Answer- False acceptance rate (FAR)

is an application that stores and protects a collection of passwords. Effective ones will
automatically fill in passwords, allowing users to choose different, random passwords
for each password-protected system.

ex Apples 'keychain' - Answer- password manager

Secret information associated with an individual and used to authenticate that individual.
- Answer- base secret

The number of trial-and-error attempts required to achieve a 50% probability of a correct
guess. - Answer- average attack space

Memorized information, a possession, or a biometric. - Answer- authentication factors

A database that associates user identities with patterns or other information to confirm
the users. - Answer- authentication database

An authentication device that produces a different credential each time it is used. -
Answer- active token

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller Scholarsstudyguide. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $13.49. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

78462 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$13.49
  • (0)
  Add to cart