Module 7 Cybersecurity questions
Study online at https://quizlet.com/_g2vmv9
1. How is SAML used? It allows secure web do-
mains to exchange user au-
thentication and authoriza-
tion data.
2. Amahle is researching elements that can prove au- Something you are
thenticity. Which of the following is based on unique
biological characteristics?
3. Which of the following elements is NOT true about The most effective pass-
passwords? words are short but complex.
4. Imka has been asked to recommend a federation OAuth
system technology that is an open-source federation
framework and can support the development of au-
thorization protocols. Which of these technologies
would she recommend?
5. How is key stretching effective in resisting password It takes more time to gener-
attacks? ate candidate password di-
gests.
6. Which of these is NOT a key stretching algorithm? MD5
7. Kholwa is explaining to her colleague how a pass- Password crackers differ as
word cracker works. Which of the following is a true to how candidates are creat-
statement about password crackers? ed.
8. After a recent security breach, Lerato is investigating Password Spraying Attack
how the breach occurred. After examining log files,
she discovered that the threat actor had used the
same password on several different user accounts.
What kind of attack was this?
1/3
Study online at https://quizlet.com/_g2vmv9
1. How is SAML used? It allows secure web do-
mains to exchange user au-
thentication and authoriza-
tion data.
2. Amahle is researching elements that can prove au- Something you are
thenticity. Which of the following is based on unique
biological characteristics?
3. Which of the following elements is NOT true about The most effective pass-
passwords? words are short but complex.
4. Imka has been asked to recommend a federation OAuth
system technology that is an open-source federation
framework and can support the development of au-
thorization protocols. Which of these technologies
would she recommend?
5. How is key stretching effective in resisting password It takes more time to gener-
attacks? ate candidate password di-
gests.
6. Which of these is NOT a key stretching algorithm? MD5
7. Kholwa is explaining to her colleague how a pass- Password crackers differ as
word cracker works. Which of the following is a true to how candidates are creat-
statement about password crackers? ed.
8. After a recent security breach, Lerato is investigating Password Spraying Attack
how the breach occurred. After examining log files,
she discovered that the threat actor had used the
same password on several different user accounts.
What kind of attack was this?
1/3