• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off

Card Range To Study



Play button


Play button




Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

16 Cards in this Set

  • Front
  • Back
behavioral biometrics:
Authenticating a user by the normal actions that the user performs.
brute force attack:
A password attack in which every possible combination of letters, numbers, and characters is used to create encrypted passwords that are matched with those in a stolen password file.
cognitive biometrics:
Authenticating a user through the perception, thought process and understanding of the user.
common access card (CAC);
A department of Defense (DoD) smart card used for identification for active duty and reserve military personnel along with civilian employees and special contractors.
dictionary attack:
A password attack that creates encrypted versions of common dictionary words and compares them against those in a stolen password file.
hybrid attack:
A password attack that slightly alters dictionary words by adding number to the end of the password, spelling words backward, slightly misspelling words , or including special characters.
multifactor authentication:
Using more than one type of authentication credential.
A secret combination of letters, numbers, and/or character that only the user should know.
Personal Identity verification(PIV):
A government standard for smart cards that covers all government employees.
rainbow tables:
Large pregenerated data sets of encrypted passwords used in password attacks.
single sign on(SSO):
Using one authentication credential to access multiple accounts or applications.
single factor authentication:
Using one type of authentication credentials.
smart card:
A card that contains an integrated circuit chip that can hold information used as part of the authentication process.
standard biometrics:
using fingerprints or other unique physical characteristics of a persons face, hands or eyes for authentication.
a small device that can be affixed to a keychain with a window display that shows a code to be used for authentication.
trusted operating system (trusted OS):
A hardened operating system that can keep attackers from accessing and controlling critical parts of a computer system.