4.6 Multifactor Authentication Flashcards

(17 cards)

1
Q

What is the term for the various parameters used during a login process?

A

Authentication factors

Common authentication factors include something you know, something you have, something you are, and somewhere you are.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is an example of something you know in the context of authentication?

A

Password

A password is made up of a string of characters or a phrase known only to the user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Fill in the blank: A personal identification number is an example of something you ______.

A

know

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a common use of a personal identification number (PIN)?

A

ATM transactions

Users are commonly asked to provide a four-digit PIN when using an ATM.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is another example of something you know that can unlock a device?

A

Unlock pattern

An unlock pattern is a specific sequence known only to the user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does ‘something you have’ refer to in authentication?

A

Physical items used for authentication

Examples include smart cards and USB security keys.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the role of a smart card in authentication?

A

Insert into a device for access

Smart cards are often used in conjunction with a PIN.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Fill in the blank: A USB security key contains a certificate that is specific to ______.

A

you

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a hardware token in the context of authentication?

A

Device creating randomized numbers

These numbers are duplicated on the server for verification.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a software token?

A

Authentication application on mobile devices

Software tokens eliminate the need to carry additional hardware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How can SMS be used as an authentication factor?

A

Sending a code to the user’s phone

This code is used during the login process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is an example of something you are in authentication?

A

Biometric data

This includes fingerprints, voiceprints, and other personal characteristics.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

True or False: A picture of your fingerprint is stored for biometric authentication.

A

False

A mathematical representation of the fingerprint is stored instead.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a challenge associated with biometric authentication?

A

Difficult to change or modify

Changing a fingerprint or voiceprint is not feasible.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What does ‘somewhere you are’ refer to in authentication?

A

Location-based authentication

This can involve GPS data or IP address verification.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How can an attempted login from a distant country be detected?

A

Location information check

If the login attempt is from a different location than previously recorded, access may be denied.

17
Q

What two types of location services can be combined to determine a user’s location?

A

IP address and GPS coordinates

This combination helps establish a more accurate physical location.