0% found this document useful (0 votes)
64 views18 pages

MCQ

nhj\

Uploaded by

poparo3921
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
64 views18 pages

MCQ

nhj\

Uploaded by

poparo3921
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 18

Section 1: Authentication Tokens

1. Which category do authentication tokens fall into in terms of


authentication mechanisms?
a) What you know
b) What you have
c) What you are
d) Where you are

Answer: b) What you have

2. What is a common example of an authentication token?


a) Password
b) Key
c) Fingerprint
d) Voiceprint

Answer: b) Key

3. What is a major disadvantage of authentication tokens?


a) They are too secure
b) They are too cheap
c) They can be lost or stolen
d) They are difficult to use

Answer: c) They can be lost or stolen

4. What is an advantage of magnetic strip cards over passwords?


a) Easier to remember
b) They can hold more data
c) They are more expensive
d) Require no hardware

Answer: b) They can hold more data


5. Which type of smart card carries out cryptographic
calculations without revealing its key?
a) PIN protected memory card
b) Cryptographic challenge/response card
c) Magnetic strip card
d) Time encryption card

Answer: b) Cryptographic challenge/response card

Section 2: Physical Access


6. What is a low-tech method for authentication in physical
access control?
a) Smart cards
b) Biometric scanners
c) Human guards
d) Password entry

Answer: c) Human guards

7. Which location-based authentication example is accurate?


a) ATM and teller terminals provide identical access
b) ATMs allow fewer transactions than teller terminals
c) Teller terminals require no authentication
d) ATMs are always more secure

Answer: b) ATMs allow fewer transactions than teller terminals

8. What is a limitation of physical access authentication?


a) Cannot differentiate between legitimate users
b) Completely replaces digital authentication
c) Can’t be combined with other methods
d) Highly scalable

Answer: a) Cannot differentiate between legitimate users


Section 3: Biometrics
9. What do biometric systems authenticate based on?
a) What you have
b) What you know
c) What you are
d) Where you are

Answer: c) What you are

10. Which biometric method examines the unique blood vessel


patterns in the eye?
a) Iris Scanner
b) Retinal Scanner
c) Face Recognition
d) Voiceprints

Answer: b) Retinal Scanner

11. Which biometric system is less intimidating and can scan


from a distance?
a) Handprint Reader
b) Fingerprint Scanner
c) Iris Scanner
d) Retinal Scanner

Answer: c) Iris Scanner

12. What is a key disadvantage of fingerprint readers?


a) Inexpensive to implement
b) Easy to spoof
c) Completely reliable
d) Require no hardware

Answer: b) Easy to spoof


13. Which biometric authentication method analyzes typing
behavior?
a) Voiceprints
b) Keystroke Timing
c) Signature Analysis
d) Face Recognition

Answer: b) Keystroke Timing

14. Which biometric system measures the dimensions and


proportions of a hand?
a) Fingerprint Scanner
b) Handprint Reader
c) Voiceprints
d) Keystroke Timing

Answer: b) Handprint Reader

15. Which biometric system can be fooled by a recording?


a) Face Recognition
b) Iris Scanner
c) Voiceprints
d) Handprint Reader

Answer: c) Voiceprints

16. Why must biometric devices use cryptographically secure


exchanges?
a) To improve user experience
b) To prevent spoofing and replay attacks
c) To reduce hardware costs
d) To simplify authentication

Answer: b) To prevent spoofing and replay attacks


17. What is a primary drawback of biometric authentication?
a) It is inexpensive
b) Biometric data cannot be reset if compromised
c) It requires no hardware
d) Completely resistant to spoofing

Answer: b) Biometric data cannot be reset if compromised

18. Which biometric method analyzes the speed and pressure of


handwritten signatures?
a) Keystroke Timing
b) Signature Analysis
c) Handprint Reader
d) Voiceprints

Answer: b) Signature Analysis

19. Which biometric method is most commonly used in


smartphones?
a) Retinal Scanner
b) Handprint Reader
c) Fingerprint Scanner
d) Keystroke Timing

Answer: c) Fingerprint Scanner

20. What is a common privacy concern with biometric


authentication?
a) Data is too easy to reset
b) Devices are too inexpensive
c) Biometric data is permanent and sensitive
d) Devices cannot store data

Answer: c) Biometric data is permanent and sensitive


Section 1: Authentication Tokens
Multiple Choice Questions (MCQs)
Which type of token uses time-sensitive codes for
authentication?
a) Static Token
b) TOTP (Time-Based One-Time Password)
c) RFID Token
d) NFC Token
Answer: b) TOTP

A USB security key is an example of:


a) Digital Signature
b) Physical Token
c) Static Password
d) Biometric Authentication
Answer: b) Physical Token

Smart cards typically require which additional authentication


factor?
a) Password
b) PIN
c) Biometric Scan
d) Voice Command
Answer: b) PIN

Which property makes hardware tokens secure?


a) Wireless access
b) Cannot be duplicated easily
c) Disposable nature
d) Static credentials
Answer: b) Cannot be duplicated easily

Which authentication token type does not need a physical


object?
a) OTP App
b) Smart Card
c) USB Token
d) RFID Keycard
Answer: a) OTP App

What is a common example of software tokens?


a) RSA Token Device
b) Google Authenticator
c) Hardware Key
d) Magnetic Stripe Card
Answer: b) Google Authenticator

What is the primary use of authentication tokens?


a) Store passwords
b) Verify identity
c) Encrypt data
d) Monitor activity
Answer: b) Verify identity

Which protocol is commonly used for token-based


authentication?
a) SSH
b) HTTPS
c) OAuth
d) HTTP
Answer: c) OAuth

Which of the following uses dynamic codes?


a) Static Tokens
b) One-Time Passwords
c) Magnetic Cards
d) Barcode Tokens
Answer: b) One-Time Passwords

What happens if a hardware token is lost?


a) Immediate account lockout
b) Permanent access loss
c) Risk of unauthorized access
d) Automatic token regeneration
Answer: c) Risk of unauthorized access

What is a disadvantage of smart cards?


a) Difficult to store data
b) Easily duplicated
c) Can be lost or stolen
d) Limited security features
Answer: c) Can be lost or stolen

Which method prevents replay attacks?


a) Static Token
b) Challenge-Response Authentication
c) Manual Entry
d) Reused Passwords
Answer: b) Challenge-Response Authentication

Which protocol supports multi-factor authentication with


tokens?
a) TCP
b) OAuth
c) FTP
d) POP3
Answer: b) OAuth

What is a key feature of hardware tokens?


a) Always online
b) Physical possession required
c) Cannot be revoked
d) Software dependency
Answer: b) Physical possession required

What technology is commonly embedded in smart cards?


a) RFID
b) NFC
c) Microchip
d) Magnetic Stripe
Answer: c) Microchip

An authentication token paired with a password creates:


a) Single-Factor Authentication
b) Dual-Layer Security
c) Multi-Factor Authentication
d) No Security Impact
Answer: c) Multi-Factor Authentication
Dynamic tokens are better because:
a) They are reusable indefinitely
b) Codes change regularly
c) They are less costly
d) They don’t require encryption
Answer: b) Codes change regularly

What is an advantage of mobile-based authentication tokens?


a) Always online
b) Portable and accessible
c) No software needed
d) High physical security
Answer: b) Portable and accessible

Token-based authentication reduces reliance on:


a) Passwords
b) Encryption
c) Networks
d) Biometric Scanners
Answer: a) Passwords

Which component is critical in two-factor authentication?


a) Static Password
b) OTP Token
c) Username Only
d) Digital Certificate
Answer: b) OTP Token

Fill-in-the-Blanks (FIB)
Tokens can be categorized as hardware or ______ tokens.
Answer: Software

Smart cards often require a ______ for additional security.


Answer: PIN

One-Time Passwords (OTP) are usually valid for a ______


duration.
Answer: Short
RSA tokens generate ______ codes periodically.
Answer: Random

The OAuth protocol is widely used for ______ authentication.


Answer: Token-based

A lost hardware token can lead to a potential ______ risk.


Answer: Security

Dynamic tokens provide codes that change ______.


Answer: Regularly

Smart cards are embedded with a secure ______.


Answer: Microchip

The purpose of tokens is to verify a user's ______.


Answer: Identity

Token authentication often supports ______-factor


authentication.
Answer: Multi

Hardware tokens require ______ possession to use.


Answer: Physical

A software token can be generated using a ______ app.


Answer: Mobile

Challenge-response systems prevent ______ attacks.


Answer: Replay

Token-based systems improve security by reducing reliance on


______.
Answer: Passwords

Tokens are categorized into dynamic and ______ tokens.


Answer: Static

The security of smart cards relies on their embedded ______.


Answer: Cryptographic keys

Lost tokens must be immediately ______.


Answer: Deactivated
OTP stands for ______.
Answer: One-Time Password

Token-based systems are often paired with ______ encryption.


Answer: Cryptographic

Tokens are considered part of the "something you ______"


authentication factor.
Answer: Have

Section 1: Authentication
Tokens
Multiple Choice Questions (MCQs)
Which token type generates a unique code every few seconds?
a) Static Token
b) Dynamic Token
c) Encrypted Token
d) Plain Token
Answer: b) Dynamic Token

What technology do smart cards often use for secure storage?


a) Magnetic stripes
b) Embedded microchips
c) Plastic coating
d) Manual entry
Answer: b) Embedded microchips

What is a significant advantage of physical tokens over


passwords?
a) Impossible to lose
b) Harder to duplicate
c) Easier to remember
d) Require no maintenance
Answer: b) Harder to duplicate
What device is commonly used for generating one-time
passwords (OTP)?
a) USB Drive
b) Smartphone App
c) Password Manager
d) Face Scanner
Answer: b) Smartphone App

What type of authentication token is used in banking systems?


a) Software Tokens
b) Hardware Tokens
c) Passwords
d) Biometrics
Answer: b) Hardware Tokens

Which card type is prone to demagnetization?


a) Smart Card
b) RFID Card
c) Magnetic Stripe Card
d) NFC Card
Answer: c) Magnetic Stripe Card

What is the primary purpose of challenge-response


authentication?
a) Improve usability
b) Prevent replay attacks
c) Store sensitive data
d) Save costs
Answer: b) Prevent replay attacks

Why are smart cards considered secure?


a) They are cheap
b) They are easy to duplicate
c) They use cryptographic keys
d) They require no maintenance
Answer: c) They use cryptographic keys

What type of authentication uses a mobile app to verify identity?


a) Static Authentication
b) OTP Authentication
c) SMS Verification
d) Manual Code Entry
Answer: b) OTP Authentication

Which factor is a disadvantage of authentication tokens?


a) Low cost
b) Easily accessible
c) Can be stolen
d) No hardware requirement
Answer: c) Can be stolen

What is an example of two-factor authentication (2FA)?


a) Password + Token
b) Username + Password
c) Email + SMS
d) OTP + Location
Answer: a) Password + Token

Which device is commonly used for RSA token generation?


a) RFID Reader
b) Key Fob
c) Fingerprint Scanner
d) Password Manager
Answer: b) Key Fob

Authentication tokens are most effective when combined with:


a) Static Passwords
b) Multi-Factor Authentication
c) Low-Security Systems
d) Open Networks
Answer: b) Multi-Factor Authentication

What type of token does not require internet connectivity?


a) Mobile Token
b) Hardware Token
c) Biometric Token
d) Email Token
Answer: b) Hardware Token

What is the primary vulnerability of magnetic stripe cards?


a) Limited data storage
b) Easy to duplicate
c) Expensive to produce
d) Too advanced
Answer: b) Easy to duplicate

What is an example of a hardware authentication token?


a) Smartwatch
b) USB Security Key
c) Password Manager
d) SMS OTP
Answer: b) USB Security Key

Which authentication method is considered "something you


have"?
a) Password
b) Token
c) Face Recognition
d) PIN
Answer: b) Token

Which factor improves token-based authentication security?


a) Sharing tokens
b) Static tokens
c) Secure encryption
d) Token duplication
Answer: c) Secure encryption

What do cryptographic challenge-response tokens prevent?


a) User fatigue
b) Replay attacks
c) Cost escalation
d) Unauthorized downloads
Answer: b) Replay attacks

What does "OTP" stand for?


a) Over-The-Protocol
b) One-Time Password
c) Offline Token Process
d) Online Token Protection
Answer: b) One-Time Password
Smart cards are most commonly used for:
a) Storage devices
b) Secure authentication
c) Tracking user behavior
d) Display purposes
Answer: b) Secure authentication

What is a key vulnerability in token-based systems?


a) Limited data capacity
b) Can be shared or stolen
c) Lack of hardware integration
d) High maintenance cost
Answer: b) Can be shared or stolen

What is the main advantage of dynamic tokens?


a) Permanent data storage
b) Unique authentication codes
c) Static authentication
d) Low energy consumption
Answer: b) Unique authentication codes

A one-time password (OTP) is typically valid for:


a) Unlimited time
b) A short duration
c) A year
d) Multiple uses
Answer: b) A short duration

What technology is commonly used in contactless cards?


a) RFID
b) USB
c) PIN
d) SMS
Answer: a) RFID

Token-based authentication is often paired with:


a) Physical barriers
b) SMS verification
c) Biometric authentication
d) Username only
Answer: c) Biometric authentication

Which factor makes hardware tokens reliable?


a) Low cost
b) Physical presence required
c) Cloud-based verification
d) Passwordless systems
Answer: b) Physical presence required

Smart cards use:


a) Secure cryptographic modules
b) Basic plastic coating
c) Magnetic strips only
d) Static data
Answer: a) Secure cryptographic modules

A major benefit of tokens over passwords is:


a) Ease of sharing
b) Physical possession required
c) Static codes
d) User anonymity
Answer: b) Physical possession required

What increases token security?


a) Frequent code changes
b) Static codes
c) Shared user accounts
d) Weak encryption
Answer: a) Frequent code changes

Here’s a collection of all MCQs formatted in the "Fill-in-


the-Blank with Answer in Brackets" style based on the
topics we've covered so far:

1. In SHA-512, the message is divided into blocks of


size ___ bits for the hash computation. (1024)
2. The primary role of a Key Distribution Center
(KDC) is to manage and distribute ___ for secure
communication. (Secret keys)
3. An authentication method relying on physical or
behavioral traits is called ___ authentication.
(Biometric)
4. In password-based authentication, users typically
provide a ___ and a password for verification.
(Username)
5. A cryptographic system that uses a pair of public
and private keys is referred to as ___
cryptography. (Asymmetric)
6. Single Sign-On (SSO) allows users to log in once
and gain access to ___ systems without logging in
again. (Multiple)
7. A digital certificate is issued by a trusted entity
known as a ___ Authority. (Certificate)
8. In a time-based one-time password (TOTP)
system, passwords are valid for a short duration,
usually ___ seconds. (30)
9. The LDAP protocol stands for Lightweight
Directory Access ___. (Protocol)
10. A Certificate Revocation List (CRL) contains a
list of certificates that are no longer ___. (Valid)
11. An authentication system using IP address
verification is referred to as ___-based
authentication. (Address)
12. The primary advantage of multi-factor
authentication (MFA) is increased ___ security.
(Access)
13. Biometric authentication using unique patterns in
the eye is performed through ___ scanners. (Iris)
14. The cryptographic hashing algorithm SHA-256
produces a hash value of ___ bits. (256)
15. In Kerberos authentication, the ___ server
verifies the user’s identity and issues a ticket.
(Authentication)
16. The weakest form of authentication is typically
considered to be ___. (Passwords)
17. A biometric authentication method analyzing
typing patterns is known as ___ timing analysis.
(Keystroke)
18. In network security, RADIUS stands for Remote
Authentication Dial-In ___ Service. (User)
19. When a central hub fails in a star topology, the
___ network goes down. (Entire)
20. Public Key Infrastructure (PKI) uses public and
___ keys to manage authentication. (Private)
21. A method that restricts authentication based on
physical or geographical location is called ___-
based authentication. (Location)
22. Voice-based biometric authentication relies on the
user's unique ___. (Voiceprint)
23. Smart cards often use a ___ to store
authentication information securely. (Chip)
24. The process of converting plaintext into
ciphertext is called ___. (Encryption)
25. Password-based authentication systems store
passwords in a ___ format for security. (Hashed)
26. The process of proving a user's identity before
granting access is called ___. (Authentication)
27. The main weakness of biometric authentication is
that biometric data cannot be ___ if
compromised. (Reset)
28. A key fob that generates time-sensitive passcodes
is an example of a ___ token. (Hardware)
29. In multi-factor authentication (MFA),
"something you know" typically refers to a ___.
(Password)
30. SSL/TLS protocols rely on ___ certificates to
establish secure connections. (Digital)

This set covers a wide range of topics across authentication,


physical access, and biometrics. Let me know if you’d like
me to add more or refine them further! 😊

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy