True/False Indicate whether the
statement is true or false.
|
|
1.
|
Although you might be asked to provide your own password, typically you are
assigned one.
|
|
2.
|
Phishing is a sophisticated approach to password theft, and may use fake Web
sites with URLs similiar to those on an official Web site.
|
Multiple Choice Identify the
choice that best completes the statement or answers the question.
|
|
3.
|
A(n) ____ protocol refers to any method that confirms a person’s identity
using something the person knows.
a. | authentication | c. | user | b. | biometric | d. | two-factor |
|
|
4.
|
____ are significant because they are the name on an account that requires a
password.
a. | Parameters | c. | User IDs | b. | Possessed objects | d. | Passkeys |
|
|
5.
|
____ protocols that use more than one means of identification are more secure
than others.
a. | Validation | c. | Concatenation | b. | Authentication | d. | Collaboration |
|
|
6.
|
PINs are typically used with ____-factor authentication protocols.
a. | single | c. | triple | b. | two | d. | multiple |
|
|
7.
|
After you use a “forgot my password” link, if your identity checks
out, your password is ____ to you.
a. | mailed | c. | e-mailed | b. | faxed | d. | all of the
above |
|
|
8.
|
____ can refer to a skilled programmer who manipulates computers with malicious
intent.
a. | Remaster | c. | Blackjack | b. | Breaker | d. | Hacker |
|
|
9.
|
Which of the following is a synonym for a criminal hacker?
a. | white hat | c. | cowboy | b. | black hat | d. | sheriff |
|
|
10.
|
Which of the following is NOT true?
a. | Password thieves can easily find your password if you write it down on a yellow
sticky note hidden under your keyboard. | b. | A hacker must have physical access to your work
area to discover your password. | c. | A hacker can use a remote computer and software
tools to systematically guess your password. | d. | A hacker can use a remote computer and software
tools to intercept your password. |
|
|
11.
|
Which of the following is NOT true?
a. | You should strive to select a unique user ID for every Web site you visit and every
online resource you access. | b. | People with your name who selected user IDs
before you might have already taken the obvious user IDs. | c. | You can maintain two
or three tiers of passwords. | d. | Use low-security passwords in situations where
you don’t really care if your security is compromised. |
|
|
12.
|
At which of the following would you use your low-security password?
a. | an online banking site | b. | an online stock portfolio
site | c. | an online bookstore that stores a copy of your credit card
information | d. | None of the above |
|
Essay
|
|
13.
|
Describe four different strategies in which hackers get your password, including
some primitive ways and some more technological advanced methods.
|