239. Use of login IDs and passwords is the
a.
Providing dynamic verification of a userb.
Providing static verification of a userc.
Providing a strong user authenticationd.
Batch and online computer systems alikeDynamic verification of a user takes place when a person types on a keyboard and leaves an electronic signature in the form of keystroke latencies in the elapsed time between keystrokes. For well-known, regular type strings, this signature can be quite consistent. Here is how a dynamic verification mechanism works: When a person wants to access a computer resource, he is required to identify himself by typing his name. The latency vector of the keystrokes of this name is compared with the reference signature stored in the computer. If this claimant’s latency vector and the reference signature are statistically similar, the user is granted access to the system. The user is asked to type his name a number of times to provide a vector of mean latencies to be used as a reference. This can be viewed as an electronic signature of the user.
Passwords do not provide a strong user authentication. If they did, there would not be a hacker problem today. Passwords provide the weakest user authentication due to their sharing and guessable nature. Only online systems require a user ID and password from a user due to their interactive nature. Only batch jobs and files require a user ID and password when submitting a job or modifying a file. Batch systems are not interactive.
240. Which of the following password selection procedures would be the
a.
Reverse or rearrange the characters in the user’s birthdayb.
Reverse or rearrange the characters in the user’s annual salaryc.
Reverse or rearrange the characters in the user’s spouse’s named.
Use randomly generated charactersThe approaches in the other three choices would be relatively easy to remember due to the user familiarity with the password origin. A simple procedure is to use well-known personal information that is rearranged.
241. How does a role-based access control mechanism work?
a.
Based on job enlargement conceptb.
Based on job duties conceptc.
Based on job enrichment conceptd.
Based on job rotation concept242. What do the countermeasures against a rainbow attack resulting from a password cracking threat include?
a.
One-time password and one-way hashb.
Keyspace and passphrasec.
Salting and stretchingd.
Entropy and user account lockoutKeyspace is the large number of possible key values (keys) created by the encryption algorithm to use when transforming the message. Passphrase is a sequence of characters transformed by a password system into a virtual password. Entropy is a measure of the amount of uncertainty that an attacker faces to determine the value of a secret.