100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

Fundamentals of Information Security - C836 - Chapter 2 || Answered Perfectly 100%.

Rating
-
Sold
-
Pages
12
Grade
A+
Uploaded on
30-08-2025
Written in
2025/2026

What is the difference between verification and authentication of an identity? correct answers Authentication is the establishment that a claim to one's identity is true, while verification is just more support for who they are claiming to be How do you measure the rate at which you fail to authenticate legitimate users in a biometric system? correct answers This is measured through two metrics the False Rejection Rate and False Acceptance Rate. Ideally, we want the two to equal each other. What do you call the process in which the client authenticates to the server and the server authenticates to the client? correct answers Mutual authentication A key would be described as which type of authentication factor? correct answers Something you have What biometric factor describes how well a characteristic resists change over time? correct answers Permanence If you're using an identity card as the basis for your authentication scheme, what steps might you add to the process to allow you to move to multi factor authentication? correct answers Use two more different factors are something you know (password), something you are (Iris scan), something you have (swipe card), something you do (gait (walking) recognition), and the place you are (at a specific terminal). If you're using an eight-character password that contain only lowercase characters, would increasing the length to ten characters represent any significant increase in strength? Why or why not? correct answers Name three reasons why an identity card alone might not make an ideal method of authentication correct answers 1.) an identity card can be stolen.

Show more Read less
Institution
Fundamentals Of Information Security
Course
Fundamentals of Information Security









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
Fundamentals of Information Security
Course
Fundamentals of Information Security

Document information

Uploaded on
August 30, 2025
Number of pages
12
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

Fundamentals of Information Security - C836 - Chapter 2 ||
Answered Perfectly 100%.


What is the difference between verification and authentication of an identity? correct answers
Authentication is the establishment that a claim to one's identity is true, while verification is just
more support for who they are claiming to be


How do you measure the rate at which you fail to authenticate legitimate users in a biometric
system? correct answers This is measured through two metrics the False Rejection Rate and
False Acceptance Rate. Ideally, we want the two to equal each other.


What do you call the process in which the client authenticates to the server and the server
authenticates to the client? correct answers Mutual authentication


A key would be described as which type of authentication factor? correct answers Something you
have


What biometric factor describes how well a characteristic resists change over time? correct
answers Permanence


If you're using an identity card as the basis for your authentication scheme, what steps might you
add to the process to allow you to move to multi factor authentication? correct answers Use two
more different factors are something you know (password), something you are (Iris scan),
something you have (swipe card), something you do (gait (walking) recognition), and the place
you are (at a specific terminal).


If you're using an eight-character password that contain only lowercase characters, would
increasing the length to ten characters represent any significant increase in strength? Why or why
not? correct answers


Name three reasons why an identity card alone might not make an ideal method of authentication
correct answers 1.) an identity card can be stolen.

, 2.) an identity card can be faked.
3.) an identity card information can change.


What factors might you use when implementing a multifactor authentication scheme for users
who are logging onto workstations that are in secure environment and are used by more than one
person? correct answers What you know
What you are


If you're developing a multi factor authentication system for an environment where you might
find larger-than-average numbers of disabled or injured users, such as a hospital, which
authentication factors might you want to use or avoid? Why? correct answers May want to avoid
fingerprints and do retina scans. It might be inconvenient if they are wearing gloves and cannot
reach the authentication device.


Define identification, including "who we claim to be." correct answers This may include who we
claim to be as a person, who a computer system claims to be over the network, who the
originating party of an e-mail claims to be, what authority we claim to have, or similar
transactions. It is important to note that the process of identification does not extend beyond this
claim and does not involve any sort of verification or validation of the identity that we claim.


Define identity verification. correct answers A step beyond identification, but it is still a step
short of authentication, Basically, just additional information to back up who you are claiming to
be


Define authentication and its factors. correct answers Authentication is the set of methods we use
to establish a claim of identity as being true.
It is important to note that authentication only establishes whether the claim of identity that has
been made is correct.
The different factors are something you know (password), something you are (Iris scan),
something you have (swipe card), something you do (gait (walking) recognition), and the place
you are (at a specific terminal).

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
SirAnton NURSING, ECONOMICS, MATHEMATICS, BIOLOGY, AND HISTORY MATERIALS BEST TUTORING, HOMEWORK HELP, EXAMS, TESTS, AND STUDY GUIDE MATERIALS WITH GUARANTEED A+ I am a dedicated medical practitioner with diverse knowledge in matters
View profile
Follow You need to be logged in order to follow users or courses
Sold
737
Member since
3 year
Number of followers
437
Documents
34833
Last sold
3 days ago
Reign Supreme Scholarly || Enlightened.

Here we offer revised study materials to elevate your educational outcomes. We have verified learning materials (Research, Exams Questions and answers, Assignments, notes etc) for different courses guaranteed to boost your academic results. We are dedicated to offering you the best services and you are encouraged to inquire further assistance from our end if need be. Having a wide knowledge in Nursing, trust us to take care of your Academic materials and your remaining duty will just be to Excel. Remember to give us a review, it is key for us to understand our clients satisfaction. We highly appreciate clients who always come back for more of the study content we offer, you are extremely valued. All the best.

Read more Read less
3.7

110 reviews

5
46
4
20
3
22
2
8
1
14

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions