Quiz

Quiz: Next-generation authentication

SearchSecurity.com Security School
This quiz is part of the SearchSecurity.com Identity and Access Management Security School lesson on next-generation authentication. Visit the Next-generation authentication lesson page for additional learning resources.

1. The USB token smart card form factor is the best choice over the ISO 7816 (credit-card sized) smart card form factor for which of the following uses?

  1. Identity badging
  2. Physical access
  3. One-time password (OTP) generation
  4. Scraping ice off of your windshield

2. Which consumer authentication technique evaluates the user's typing (i.e., both the time between keystrokes and the time that a key is pressed) as part of the user authentication process?

  1. Risk analytics
  2. Behavioral biometrics
  3. One-time password (OTP) devices
  4. Mobile PKI

3. Which of the following attack methods does not apply to hardware-based one-time password (OTP) devices?

  1. Harvesting
  2. Man-in-the-middle
  3. Private key malware
  4. Impersonation

4. Which of the following authentication methods would provide the highest level of identity assurance for a Web-based human resources application with SSL enabled on the Web server?

  1. X.509 certificate with private key stored in software
  2. Hardware-based one-time password (OTP) device
  3. X.509 certificate with private key stored on a smart card
  4. Password
  5. Integrated Windows Authentication (IWA), with a password used to initially authenticate to the Windows workstation

5. Which of the following identity-proofing methods provides the highest level of identity assurance in an account-unlocking scenario?

  1. Knowledge-based authentication (KBA) -- favorite color
  2. Automated phone call to registered phone number
  3. Out-of-band email to a registered address
  4. Knowledge-based authentication (KBA) -- elementary school

If you answered two or more questions incorrectly, revisit the materials from SearchSecurity.com's Identity and Access Management Security School lesson, Next-generation authentication:

  • Webcast: The buyers' guide to stronger authentication
  • Tip: How to choose the right smart card
  • Podcast: Countdown -- Top 5 consumer authentication technologies on the market today

    If you answered four or more questions correctly, return to SearchSecurity.com's Identity and Access Management Security School and begin another lesson, or try another school in SearchSecurity.com's Security School Course Catalog.

    This was first published in May 2007

  • There are Comments. Add yours.

     
    TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

    REGISTER or login:

    Forgot Password?
    By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
    Sort by: OldestNewest

    Forgot Password?

    No problem! Submit your e-mail address below. We'll send you an email containing your password.

    Your password has been sent to: