This Content Component encountered an error

Identity and Access Management Security School

Future authentication technologies: How to choose the right product <<previous|next>>

Quiz:

Quiz: Next-generation authentication

SearchSecurity.com

SearchSecurity.com Security School
This quiz is part of the SearchSecurity.com Identity and Access Management Security School lesson on next-generation authentication. Visit the Next-generation authentication lesson page for additional learning resources.

1. The USB token smart card form factor is the best choice over the ISO 7816 (credit-card sized) smart card form factor for which of the following uses?

  1. Identity badging
  2. Physical access
  3. One-time password (OTP) generation
  4. Scraping ice off of your windshield

2. Which consumer authentication technique evaluates the user's typing (i.e., both the time between keystrokes and the time that a key is pressed) as part of the user authentication process?

  1. Risk analytics
  2. Behavioral biometrics
  3. One-time password (OTP) devices
  4. Mobile PKI

3. Which of the following attack methods does not apply to hardware-based one-time password (OTP) devices?

  1. Harvesting
  2. Man-in-the-middle
  3. Private key malware
  4. Impersonation

4. Which of the following authentication methods would provide the highest level of identity assurance for a Web-based human resources application with SSL enabled on the Web server?

  1. X.509 certificate with private key stored in software
  2. Hardware-based one-time password (OTP) device
  3. X.509 certificate with private key stored on a smart card
  4. Password
  5. Integrated Windows Authentication (IWA), with a password used to initially authenticate to the Windows workstation

5. Which of the following identity-proofing methods provides the highest level of identity assurance in an account-unlocking scenario?

  1. Knowledge-based authentication (KBA) -- favorite color
  2. Automated phone call to registered phone number
  3. Out-of-band email to a registered address
  4. Knowledge-based authentication (KBA) -- elementary school

If you answered two or more questions incorrectly, revisit the materials from SearchSecurity.com's Identity and Access Management Security School lesson, Next-generation authentication:

  • Webcast: The buyers' guide to stronger authentication
  • Tip: How to choose the right smart card
  • Podcast: Countdown -- Top 5 consumer authentication technologies on the market today

    If you answered four or more questions correctly, return to SearchSecurity.com's Identity and Access Management Security School and begin another lesson, or try another school in SearchSecurity.com's Security School Course Catalog.

  • Related glossary terms

    Terms from Whatis.com − the technology online dictionary
    Two-Factor and Multifactor Authentication Strategies

    Related Resources