There are quite a few ways to authenticate users who want access to your organization's network resources. Depending on how critical the data is that you're protecting, one method may or may not provide the level of protection you want. Take this quiz to test your knowledge of authentication methods and learn more about them.
How to take the quiz:
- After reading the question, click on the answer that you think is correct to go to the WhatIs.com definition. If the answer you've chosen is correct, you will see the question text or an approximation of it somewhere in the definition.
- Check your answers by using the answer key at the end of the quiz.
2.) This type of authentication device consists of a reader/scanner and software that encrypts and converts the scanned information into digital form so it can be compared with previous records.
b. brain fingerprinting
c. security ID
d. stateful inspection
3.) This secure method for authenticating a request for a service in a computer network was developed through the Athena Project at the Massachusetts Institute of Technology.
c. Automated Fingerprint Identification System
d. Internet Key Exchange
4.) This electronic "credit card" establishes a user's credentials when doing business or other transactions on the Web and is issued by a certification authority.
a. private key
b. digital certificate
c. smart card
d. ownership tag
5.) This is an older authentication protocol common to Unix networks that allows a remote access server to forward a user's logon password to an authentication server to determine whether access can be allowed to a given system.
6.) Microsoft's Passport was an example of this technology. It allows users to register their personal information once to access multiple applications.
a. relative identifier
b. biometric verification
c. single signon
d. Microsoft Point-to-Point Encryption
e. slag code
7.) This security management product for OS/390 gives access to a computer system only to users who have the authorization to use a requested resource.
b. Resource Access Control Facility
c. Media Access Control layer
d. Remote Authentication Dial-In User Service
e. Electronic Code Book
10.) This is a client/server protocol and software that enables remote access servers to communicate with a central server to authenticate dial-in users and authorize their access to the requested system or service.