CH12SEC110

.pdf

School

Oklahoma City Community College *

*We aren’t endorsed by this school

Course

1353

Subject

Chemistry

Date

May 23, 2024

Type

pdf

Pages

3

Uploaded by AmbassadorCrown4863

CH12 SEC110 Study online at https://quizlet.com/_e7mpmd 1. Ram's enterprise is hosting a web app that requires authentication. Recently, the password digest files of other enterprises were stolen, and the attackers cracked the passwords with ease. As such, Ram was asked to implement additional security measures for the web app's passwords. Which of the following methods should Ram apply? He should use Key stretching 2. In an interview, you were asked to crack a password and told that the password is a commonly used word. Which of the following methods should you apply? You should per- form a dictionary attack 3. Which of the following can protect a password digest from attackers? Argon2 4. Your enterprise recently approved using fingerprint scanners to authenticate employees who access re- stricted areas. You are assigned to conduct a study on how secure fingerprint authentication is. Which of the following should you report? Fingerprint scan- ners can be used for trickery in rare cases 5. You are working as a security admin in an enter- prise. While you were analyzing different password attacks, you found that whenever an individual user's password gets cracked, another user with the same password residing in the same password digest file also has their account compromised. How should you prevent this from happening in the future? You should add salt to the pass- word before hash- ing 6. Which of the following is a motherboard chip that provides cryptographic services? Trusted platform module 7. Which of the following authentication methods bellyags in the "something you have" category? Security key 8. While analyzing a security breach, you found the at- tacker followed these attack patterns: The attacker initially tried the commonly used pass- word "passwOrd" on all enterprise user accounts and then started trying various intelligible words like "pas- DHCP server logs 1 / 3
CH12 SEC110 Study online at https://quizlet.com/_e7mpmd sive," "partner," etc. Which of the following attacks was performed by the attacker? 9. You are working as a security expert in an e-com- merce enterprise. Your company recently decided on a short-term collaboration with a small business named BuyMe,land the following issue arose. Whenever your customers purchase any product from BuyMe, the e-commerce website redirects them to the BuyMe website, asking for additional authentication. This results in customers abandoning their purchas- es. To solve this issue, both enterprises agree to use a single authentication process wherein the users, once logged in to your website, can purchase from BuyMe without additional steps. How should you implement this without storing the customers' credentials on the BuyMe server? Use SAML 10. You want to implement an authentication method so that different password attacks, like dictionary at- tacks, brute force attacks, etc., will not result in unau- thorized access to the web application hosted by your enterprise. You want to do this by not using any spe- cialized hardware or making any changes to the user's activity during the authentication process. Which of the following methods should you apply? You should imple- ment keystroke dy- namics 11. Which of the following best describes skimming? Capturing informa- tion from the mag- netic stripe of a smartcard 12. The following data is being used for a password at- tack: "?u ?1?1?1?1?d?d?d?d." Which of the following types of attack is this? Rule attack 13. In an interview, you were asked to choose the least vulnerable password from the following list. Which of the following should you choose? earthwaterforest- treemanworldkid 2 / 3
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help