This Content Component encountered an error


Quiz: Next-generation authentication Security School
This quiz is part of the Identity and Access Management Security School lesson on next-generation authentication. Visit the Next-generation authentication lesson page for additional learning resources.

1. The USB token smart card form factor is the best choice over the ISO 7816 (credit-card sized) smart card form factor for which of the following uses?

  1. Identity badging
  2. Physical access
  3. One-time password (OTP) generation
  4. Scraping ice off of your windshield

2. Which consumer authentication technique evaluates the user's typing (i.e., both the time between keystrokes and the time that a key is pressed) as part of the user authentication process?

  1. Risk analytics
  2. Behavioral biometrics
  3. One-time password (OTP) devices
  4. Mobile PKI

3. Which of the following attack methods does not apply to hardware-based one-time password (OTP) devices?

  1. Harvesting
  2. Man-in-the-middle
  3. Private key malware
  4. Impersonation

4. Which of the following authentication methods would provide the highest level of identity assurance for a Web-based human resources application with SSL enabled on the Web server?

  1. X.509 certificate with private key stored in software
  2. Hardware-based one-time password (OTP) device
  3. X.509 certificate with private key stored on a smart card
  4. Password
  5. Integrated Windows Authentication (IWA), with a password used to initially authenticate to the Windows workstation

5. Which of the following identity-proofing methods provides the highest level of identity assurance in an account-unlocking scenario?

  1. Knowledge-based authentication (KBA) -- favorite color
  2. Automated phone call to registered phone number
  3. Out-of-band email to a registered address
  4. Knowledge-based authentication (KBA) -- elementary school

If you answered two or more questions incorrectly, revisit the materials from's Identity and Access Management Security School lesson, Next-generation authentication:

  • Webcast: The buyers' guide to stronger authentication
  • Tip: How to choose the right smart card
  • Podcast: Countdown -- Top 5 consumer authentication technologies on the market today

    If you answered four or more questions correctly, return to's Identity and Access Management Security School and begin another lesson, or try another school in's Security School Course Catalog.

  • Related glossary terms

    Terms from − the technology online dictionary
    Two-Factor and Multifactor Authentication Strategies

    Related Resources