click below
click below
Normal Size Small Size show me how
CYB1UofI_FISCH2.6
Exercise: Identification&Authentication
| Question | Answer |
|---|---|
| What is the difference between verification and authentication of an identity? | |
| How do you measure the rate at which you fail to authenticate legitimate users in a biometric system? | |
| What do you call the process in which the client authenticates to the server and the server authenticates to the client? | |
| A key would be described as which type of authentication factor? | |
| What biometric factor describes how well a characteristic resists change over time? | |
| If you’re using an identity card as the basis for your authentication scheme, what steps might you add to the process to allow you to move to multifactor authentication? | |
| If you’re using an eight-character password that contains only lowercase characters, would increasing the length to ten characters represent any significant increase in strength? Why or why not? | |
| Name three reasons why an identity card alone might not make an ideal method of authentication. | |
| What factors might you use when implementing a multifactor authentication scheme for users who are logging onto workstations that are in a secure environment and are used by more than one person? | |
| If you’re developing a multifactor authentication system for an environment where you might find larger-than-average numbers of disabled or injured users, such as a hospital, which authentication factors might you want to use or avoid? Why? |