Quiz: Authentication methods

Test your knowledge of authentication with our quiz.

There are myriad ways to authenticate users to your organization's network resources. Depending on the criticality...

of the data you're protecting, one method may or may not provide the level of protection you desire. Take this quiz to test your knowledge of authentication methods and learn more about them with the resources we offer below.

How to take the quiz:
- After reading the question, click on the answer that you think is correct to go to the whatis.com definition. If the answer you've chosen is correct, you will see the question text or an approximation of it somewhere in the definition.
- After reading the question, write down the letter of your answer choice on scrap paper. Check your answers by using the answer key at the end of the quiz.

1.) This two-level scheme for authenticating network users functions as part of the Web's Hypertext Transfer Protocol.
a. SSL
b. LUHN formula
c. IPsec
e. secret key

2.) This type of authentication device consists of a reader/scanner, software that converts the scanned information into digital form and a database that stores data for comparison with previous records.
a. biometric
b. brain fingerprinting
c. security ID
d. stateful inspection
e. honeypot

3.) This secure method for authenticating a request for a service in a computer network was developed in the Athena Project at the Massachusetts Institute of Technology.
a. AES
b. Carnivore
c. Automated Fingerprint Identification System
d. Internet Key Exchange
e. Kerberos

4.) This electronic "credit card" establishes a user's credentials when doing business or other transactions on the Web and is issued by a certification authority.
a. private key
b. digital certificate
c. smart card
d. ownership tag
e. PIN

5.) This is an older authentication protocol common to Unix networks that allows a remote access server to forward a user's logon password to an authentication server to determine whether access can be allowed to a given system.
a. DRP
d. GPO
e. C2

6.) Microsoft's Passport is an example of this technology, which allows users to register their personal information once to access multiple applications.
a. relative identifier
b. biometric verification
c. single signon
d. Microsoft Point-to-Point Encryption
e. slag code

7.) This security management product for OS/390 gives access to a computer system only to users who have the authorization to use a requested resource.
a. ACF2
b. Resource Access Control Facility
c. Media Access Control layer
d. Remote Authentication Dial-In User Service
e. Electronic Code Book

8.) This small hardware device is a type of security token that provides two-factor authentication.
a. key fob
b. dongle
c. SSL card
d. Clipper
e. keychain drive

9.) This standard being developed by IBM, Microsoft, Novell and others will allow different manufacturers' biometric software to interact.
c. Twofish
d. BioAPI
e. Tempest

10.) This is a client/server protocol and software that enables remote access servers to communicate with a central server to authenticate dial-in users and authorize their access to the requested system or service.
a. OFB
b. BO2K
d. DES


See the rest of our quiz topics
Answer Key:

1.) d. CRAM
Read this definition to learn more about Hypertext Transfer Protocol.

2.) a. biometric
Learn about biometric technology in this article, Biometrics: Improving, but not perfect.

3.) e. Kerberos
Learn more about Kerberos in the Tech Tip, Kerberos and network access security

4.) b. digital certificate
Read the Executive Security Briefing, It's a matter of trust: Digital certificates and e-signatures, to learn more about digital certificates.

5.) c. TACAS
Learn more about securing Unix networks with this collection of resources.

6.) c. single signon
Learn how single signon works in this expert Q&A.

7.) b. Resource Access Control Facility
To learn more about securing mainframes, read this article, Web-enabling mainframes: Security flags are raised.

8.) a. key fob
Read the Network Security Tip Two-factor authentication grows up for more information on two-factor authentication.

9.) d. BioAPI
Learn more about BioAPI with this article, BioAPI standard may spur biometrics acceptance.

10.) e. RADIUS
Read the Tech Tip Save your bacon with a VPN to learn more about secure remote access.


This was first published in May 2003

Dig Deeper on PKI and Digital Certificates



Find more PRO+ content and other member only offers, here.



Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: