There are myriad ways to authenticate users to your organization's network resources. Depending on the criticality of the data you're protecting, one method may or may not provide the level of protection you desire. Take this quiz to test your knowledge of authentication methods and learn more about them with the resources we offer below.

How to take the quiz:
- After reading the question, click on the answer that you think is correct to go to the definition. If the answer you've chosen is correct, you will see the question text or an approximation of it somewhere in the definition.
- After reading the question, write down the letter of your answer choice on scrap paper. Check your answers by using the answer key at the end of the quiz.

1.) This two-level scheme for authenticating network users functions as part of the Web's Hypertext Transfer Protocol.

    Requires Free Membership to View

b. LUHN formula
c. IPsec
e. secret key

2.) This type of authentication device consists of a reader/scanner, software that converts the scanned information into digital form and a database that stores data for comparison with previous records.
a. biometric
b. brain fingerprinting
c. security ID
d. stateful inspection
e. honeypot

3.) This secure method for authenticating a request for a service in a computer network was developed in the Athena Project at the Massachusetts Institute of Technology.
a. AES
b. Carnivore
c. Automated Fingerprint Identification System
d. Internet Key Exchange
e. Kerberos

4.) This electronic "credit card" establishes a user's credentials when doing business or other transactions on the Web and is issued by a certification authority.
a. private key
b. digital certificate
c. smart card
d. ownership tag
e. PIN

5.) This is an older authentication protocol common to Unix networks that allows a remote access server to forward a user's logon password to an authentication server to determine whether access can be allowed to a given system.
a. DRP
d. GPO
e. C2

6.) Microsoft's Passport is an example of this technology, which allows users to register their personal information once to access multiple applications.
a. relative identifier
b. biometric verification
c. single signon
d. Microsoft Point-to-Point Encryption
e. slag code

7.) This security management product for OS/390 gives access to a computer system only to users who have the authorization to use a requested resource.
a. ACF2
b. Resource Access Control Facility
c. Media Access Control layer
d. Remote Authentication Dial-In User Service
e. Electronic Code Book

8.) This small hardware device is a type of security token that provides two-factor authentication.
a. key fob
b. dongle
c. SSL card
d. Clipper
e. keychain drive

9.) This standard being developed by IBM, Microsoft, Novell and others will allow different manufacturers' biometric software to interact.
c. Twofish
d. BioAPI
e. Tempest

10.) This is a client/server protocol and software that enables remote access servers to communicate with a central server to authenticate dial-in users and authorize their access to the requested system or service.
a. OFB
b. BO2K
d. DES


See the rest of our quiz topics
Answer Key:

1.) d. CRAM
Read this definition to learn more about Hypertext Transfer Protocol.

2.) a. biometric
Learn about biometric technology in this article, Biometrics: Improving, but not perfect.

3.) e. Kerberos
Learn more about Kerberos in the Tech Tip, Kerberos and network access security

4.) b. digital certificate
Read the Executive Security Briefing, It's a matter of trust: Digital certificates and e-signatures, to learn more about digital certificates.

5.) c. TACAS
Learn more about securing Unix networks with this collection of resources.

6.) c. single signon
Learn how single signon works in this expert Q&A.

7.) b. Resource Access Control Facility
To learn more about securing mainframes, read this article, Web-enabling mainframes: Security flags are raised.

8.) a. key fob
Read the Network Security Tip Two-factor authentication grows up for more information on two-factor authentication.

9.) d. BioAPI
Learn more about BioAPI with this article, BioAPI standard may spur biometrics acceptance.

10.) e. RADIUS
Read the Tech Tip Save your bacon with a VPN to learn more about secure remote access.

This was first published in May 2003

There are Comments. Add yours.

TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

Disclaimer: Our Tips Exchange is a forum for you to share technical advice and expertise with your peers and to learn from other enterprise IT professionals. TechTarget provides the infrastructure to facilitate this sharing of information. However, we cannot guarantee the accuracy or validity of the material submitted. You agree that your use of the Ask The Expert services and your reliance on any questions, answers, information or other materials received through this Web site is at your own risk.