Definition

Quiz: Authentication Methods

There are quite a few ways to authenticate users who want access to your organization's network resources. Depending on how critical the data is that you're protecting, one method may or may not provide the level of protection you want. Take this quiz to test your knowledge of authentication methods and learn more about them.

How to take the quiz:
- After reading the question, click on the answer that you think is correct to go to the WhatIs.com definition. If the answer you've chosen is correct, you will see the question text or an approximation of it somewhere in the definition.
OR
- Check your answers by using the answer key at the end of the quiz.

1.) This two-level scheme for authenticating network users functions as part of the Web's Hypertext Transfer Protocol.
a. SSL
b. LUHN formula
c. IPSec
d. CRAM
e. secret key

2.) This type of authentication device consists of a reader/scanner and software that encrypts and converts the scanned information into digital form so it can be compared with previous records.
a. biometric
b. brain fingerprinting
c. security ID
d. stateful inspection
e. honeypot

3.) This secure method for authenticating a request for a service in a computer network was developed through the Athena Project at the Massachusetts Institute of Technology.
a. AES
b. Carnivore
c. Automated Fingerprint Identification System
d. Internet Key Exchange
e. Kerberos

4.) This electronic "credit card" establishes a user's credentials when doing business or other transactions on the Web and is issued by a certification authority.
a. private key
b. digital certificate
c. smart card
d. ownership tag
e. PIN

5.) This is an older authentication protocol common to Unix networks that allows a remote access server to forward a user's logon password to an authentication server to determine whether access can be allowed to a given system.
a. DRP
b. CPRM
c. TACACS
d. GPO
e. C2

6.) Microsoft's Passport was an example of this technology. It allows users to register their personal information once to access multiple applications.
a. relative identifier
b. biometric verification
c. single signon
d. Microsoft Point-to-Point Encryption
e. slag code

7.) This security management product for OS/390 gives access to a computer system only to users who have the authorization to use a requested resource.
a. ACF2
b. Resource Access Control Facility
c. Media Access Control layer
d. Remote Authentication Dial-In User Service
e. Electronic Code Book

8.) This small hardware device is a type of security token that provides two-factor authentication.
a. key fob
b. dongle
c. SSL card
d. Clipper
e. keychain drive

9.) A primary goal of this consortium is to promote interoperability among biometric applications.
a. IDEA
b. PKCS
c. Twofish
d. BioAPI
e. Tempest

10.) This is a client/server protocol and software that enables remote access servers to communicate with a central server to authenticate dial-in users and authorize their access to the requested system or service.
a. OFB
b. BO2K
c. ICMP
d. DES
e. RADIUS

See answer key

This was last updated in September 2006
Posted by: Margaret Rouse

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

More News and Tutorials

Do you have something to add to this definition? Let us know.

Send your comments to techterms@whatis.com

There are Comments. Add yours.

 
TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: