Quiz: Next-generation authentication

A five-question multiple-choice quiz to test your understanding of the content presented by expert Mark Diodati in this lesson of SearchSecurity.com's Identity and Access Management Security School.

SearchSecurity.com Security School
This quiz is part of the SearchSecurity.com Identity and Access Management Security School lesson on next-generation authentication. Visit the Next-generation authentication lesson page for additional learning resources.

1. The USB token smart card form factor is the best choice over the ISO 7816 (credit-card sized) smart card form factor for which of the following uses?

  1. Identity badging
  2. Physical access
  3. One-time password (OTP) generation
  4. Scraping ice off of your windshield

2. Which consumer authentication technique evaluates the user's typing (i.e., both the time between keystrokes and the time that a key is pressed) as part of the user authentication process?

  1. Risk analytics
  2. Behavioral biometrics
  3. One-time password (OTP) devices
  4. Mobile PKI

3. Which of the following attack methods does not apply to hardware-based one-time password (OTP) devices?

  1. Harvesting
  2. Man-in-the-middle
  3. Private key malware
  4. Impersonation

4. Which of the following authentication methods would provide the highest level of identity assurance for a Web-based human resources application with SSL enabled on the Web server?

  1. X.509 certificate with private key stored in software
  2. Hardware-based one-time password (OTP) device
  3. X.509 certificate with private key stored on a smart card
  4. Password
  5. Integrated Windows Authentication (IWA), with a password used to initially authenticate to the Windows workstation

5. Which of the following identity-proofing methods provides the highest level of identity assurance in an account-unlocking scenario?

  1. Knowledge-based authentication (KBA) -- favorite color
  2. Automated phone call to registered phone number
  3. Out-of-band email to a registered address
  4. Knowledge-based authentication (KBA) -- elementary school

If you answered two or more questions incorrectly, revisit the materials from SearchSecurity.com's Identity and Access Management Security School lesson, Next-generation authentication:

  • Webcast: The buyers' guide to stronger authentication
  • Tip: How to choose the right smart card
  • Podcast: Countdown -- Top 5 consumer authentication technologies on the market today

    If you answered four or more questions correctly, return to SearchSecurity.com's Identity and Access Management Security School and begin another lesson, or try another school in SearchSecurity.com's Security School Course Catalog.

  • This was last published in May 2007

    Dig Deeper on Two-factor and multifactor authentication strategies

    Start the conversation

    Send me notifications when other members comment.

    By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

    Please create a username to comment.