There are quite a few ways to authenticate users who want access to your organization's network resources. Depending on how critical the data is that you're protecting, one method may or may not provide the level of protection you want. Take this quiz to test your knowledge of authentication methods and learn more about them.
How to take the quiz:
- After reading the question, click on the answer that you think is correct to go to the whatis.com definition. If the answer you've chosen is correct, you will see the question text or an approximation of it somewhere in the definition.
- After reading the question, write down the letter of your answer choice on scrap paper. Check your answers by using the answer key at the end of the quiz.
1.) This two-level scheme for authenticating network users
functions as part of the Web's Hypertext Transfer Protocol.
b. LUHN formula
e. secret key
2.) This type of authentication device consists of a
reader/scanner, software that converts the scanned information
into digital form and a database that stores data for
comparison with previous records.
b. brain fingerprinting
c. security ID
d. stateful inspection
3.) This secure method for authenticating a request for a
service in a computer network was developed in the Athena
Project at the Massachusetts Institute of Technology.
c. Automated Fingerprint Identification System
d. Internet Key Exchange
4.) This electronic "credit card" establishes a user's
credentials when doing business or other transactions on the
Web and is issued by a certification authority.
a. private key
b. digital certificate
c. smart card
d. ownership tag
5.) This is an older authentication protocol common to Unix
networks that allows a remote access server to forward a
user's logon password to an authentication server to determine
whether access can be allowed to a given system.
6.) Microsoft's Passport is an example of this technology,
which allows users to register their personal information once
to access multiple applications.
a. relative identifier
b. biometric verification
c. single signon
d. Microsoft Point-to-Point Encryption
e. slag code
7.) This security management product for OS/390 gives
access to a computer system only to users who have the
authorization to use a requested resource.
b. Resource Access Control Facility
c. Media Access Control layer
d. Remote Authentication Dial-In User Service
e. Electronic Code Book
10.) This is a client/server protocol and software that
enables remote access servers to communicate with a central
server to authenticate dial-in users and authorize their
access to the requested system or service.
SCROLL DOWN FOR ANSWER KEY
Be sure to take these other quizzes:
Quiz #1: Help Desk Basics
Quiz #2: Security Basics
Quiz #3: Data Storage
Quiz #4: Networking Hardware
Quiz #5: Getting Your Message Across the Network
Quiz #6: Servers
Quiz #7: Protocols
Quiz #8: Database Basics
Quiz #9: Wireless
Quiz #10: TCP/IP
Quiz #11: Ego-Booster
Quiz #12: Database II
Quiz #13: AS/400
Quiz #14: Peripherals
Quiz #15: HP
Quiz #16: Web Management Basics
Quiz #17: DSL
Quiz #18: Do you know me? You should!
Quiz #19: Artificial Intelligence
Quiz #20: Cryptography
Quiz #21: We're Going to the Zoo!
Quiz #22: Web Site Performance
Quiz #23: Firewalls
Quiz #24: Web Services
Quiz #25: Security
Quiz #26: Storage Smarts
Quiz #27: Security Awareness for End-users
Quiz #28: Ethernet
Quiz #29: iSeries (AS/400) Commands
Quiz #30: Troubleshooting
Quiz #31: Laptops
Quiz #32: Securing your network
Quiz #33: Logic Chips
Quiz #34: Workstations
Quiz #35: Common Vulnerabilities
Quiz #36: Linux Basics
Quiz #37: Customers and Call Centers
Quiz #38: Wireless Standards and Protocols
Quiz #39: iSeries (AS/400) History
Quiz #40: Authentication Methods (you're on this quiz now)
1.) d. CRAM
Read this definition to learn more about Hypertext Transfer Protocol.
2.) a. biometric
Learn about biometric technology in this article, Biometrics: Improving, but not perfect.
3.) e. Kerberos
Learn more about Kerberos in the Tech Tip, Kerberos and network access security
4.) b. digital certificate
Read the Executive Security Briefing, It's a matter of trust: Digital certificates and e-signatures, to learn more about digital certificates.
5.) c. TACACS
Learn more about securing Unix networks with this collection of resources.
6.) c. single signon
Learn how single signon works in this expert Q&A.
7.) b. Resource Access Control Facility
To learn more about securing mainframes, read this article, Web-enabling mainframes: Security flags are raised.
8.) a. key fob
Read the Network Security Tip Two-factor authentication grows up for more information on two-factor authentication.
9.) d. BioAPI
Learn more about BioAPI with this article, BioAPI standard may spur biometrics acceptance.
10.) e. RADIUS
Read the Tech Tip Save your bacon with a VPN to learn more about secure remote access.
>> Find products and vendors related to Quiz #40: Authentication Methods.
Let us know how you did and suggest a topic for a future quiz! firstname.lastname@example.org