Which of the following identification and authentication factors are often well known or easily discovered by others on the same network or system quizlet?

How do you want to study today?

The five different forms of authentication factors are:
a. Something you know (such as a password, code, PIN, combination, or secret phrase)
b. Something you have (such as a smartcard, token device, or key)
c. Something you are (such as a fingerprint, a retina scan, or voice recognition; often referred to as biometrics, discussed later in this chapter)
d. Somewhere you are (such as a physical or logical location); this can be seen as a subset of something you know.
e. Something you do (such as your typing rhythm, a secret handshake, or a private knock). This can be seen as a subset of something you know.

Sets with similar terms

Group Policy Objects (GPOs) are applied in which of the following orders?

-GPO linked to site, GPO linked to domain, GPO linked to organizational unit (lowest to highest), Local Group Policy.

-Local Group Policy, GPO linked to site, GPO linked to domain, GPO linked to organizational unit (highest to lowest).

-GPO linked to site, GPO linked to domain, GPO linked to organizational unit (highest to lowest), Local Group Policy.

-Local Group Policy, GPO linked to site, GPO linked to domain, GPO linked to organizational unit (lowest to highest).

You manage a single domain named widgets.com.

Organizational units (OUs) have been created for each company department. User and computer accounts have been moved into their corresponding OUs.

You define a password and account lockout policy for the domain. However, members of the Directors OU want to enforce longer passwords than are required for the rest of the users.

You need to make the change as easily as possible. Which of the following actions should you take?

- Create a GPO linked to the Directors OU. Configure the password policy in the new GPO.

- Implement a granular password policy for the users in the Directors OU.

- Create a new domain. Move the contents of the Directors OU to the new domain and then configure the necessary password policy on the domain.

- Go to Active Directory Users and Computers. Select all user accounts in the Directors OU, and then edit the user account properties to require the longer password.

PIN
Something You Know

Smart card
Something You Have

Password
Something You Know

Retina scan
Something You Are

Fingerprint scan
Something You Are

Hardware token
Something You Have

Passphrase
Something You Know

Voice recognition
Something You Are

Wi-Fi triangulation
Somewhere You Are

Typing behaviors
Something You Do

Which of the following is an example of an authentication factor that includes something you do?

There are three common factors used for authentication: Something you know (such as a password) Something you have (such as a smart card) Something you are (such as a fingerprint or other biometric method)

Which of the following is the most common form of authentication?

Passwords are the most common methods of authentication. Passwords can be in the form of a string of letters, numbers, or special characters.

What are authentication factors quizlet?

When two or more authentication factors are used. The three factors of authentication are something you know (such as a password), something you have (such as a smart card), and something you are (proven through biometrics, such as fingerprints).

Which of the following is a password that relates to things that people know such as a mother's maiden name or a pet's name?

Cognitive passwords are passwords that relate to things that people know, such as a mother's maiden name, or the name of a pet.