PRACTICE EXAM QUESTIONS AND CORRECT
ANSWERS (VERIFIED ANSWERS) PLUS
RATIONALES 2026 Q&A | INSTANT
DOWNLOAD PDF
1. What is the primary purpose of FIDO authentication?
A. To replace passwords with usernames
B. To enhance user privacy and security
C. To store biometric data in the cloud
D. To allow multiple users to share credentials
Answer: B
Rationale: FIDO aims to enhance security and privacy by using password
less authentication methods such as biometrics or hardware tokens.
2. Which of the following is a key component of FIDO2?
A. Webathons and CTAP
B. OAuth 2.0 and SAML
C. TLS and HTTPS
D. LDAP and Kerberos
Answer: A
Rationale: FIDO2 consists of Webathons (for browser-based
authentication) and CTAP (Client to Authenticator Protocol for external
devices).
,3. What does Webathons stand for?
A. Web Authentication
B. Web Authorization Network
C. Web Analytics Tool
D. Web Access Node
Answer: A
Rationale: Webathons is the W3C standard for web authentication and
is a core part of FIDO2.
4. Which authentication factor does FIDO prioritize?
A. Knowledge factor
B. Possession factor
C. Inherence factor
D. All of the above
Answer: D
Rationale: FIDO supports multi-factor authentication including
something you know (password), something you have (security key),
and something you are (biometric).
5. What type of key pair is generated in FIDO authentication?
A. Symmetric key pair
B. Asymmetric key pair
C. Password hash key
D. Shared secret key
Answer: B
Rationale: FIDO uses asymmetric cryptography, generating a private
key stored on the authenticator and a public key stored on the server.
,6. In FIDO authentication, where is the private key stored?
A. On the server
B. On the client authenticator
C. In the cloud
D. In the browser cache
Answer: B
Rationale: The private key never leaves the user’s device; only the public
key is shared with the server.
7. Which protocol allows external authenticators like USB keys to
communicate with devices?
A. HTTPS
B. CTAP
C. SSH
D. LDAP
Answer: B
Rationale: CTAP (Client to Authenticator Protocol) allows FIDO
authenticators to communicate with browsers or devices.
8. What is the role of the relying party (RP) in FIDO?
A. Stores users’ private keys
B. Verifies users’ credentials using public keys
C. Generates biometric templates
D. Sends OTP codes via SMS
, Answer: B
Rationale: The relying party (e.g., a website) verifies authentication by
checking signatures against the public key.
9. Which of the following is a benefit of passwordless authentication?
A. Reduces phishing attacks
B. Eliminates password reuse
C. Improves user convenience
D. All of the above
Answer: D
Rationale: Passwordless authentication improves security and user
experience while mitigating common password-related risks.
10. What does “inherence factor” refer to in authentication?
A. Something you know
B. Something you have
C. Something you are
D. Something you can guess
Answer: C
Rationale: The inherence factor refers to biometrics, like fingerprints or
facial recognition.
11. Which FIDO protocol is designed for web browsers?
A. FIDO U2F
B. WebAuthn
C. CTAP
D. OAuth