31) Listed below are four general means of authenticating a user's identity, which can be used alone or in combination, provide two examples of each mean. a) Something the individual knows b) Something the individual possesses: c) Something the individual is (static biometrics): d) Something the individual does (dynamic biometrics): 20 points 32) Explain the following attacks and provide the countermeasure for each on of then: a) Specific Account Attack The standard countermeasure b) Workstation Hijacking The standard countermeasure C)Password Guessing Against single user The standard countermeasure

Answers

Answer 1

Answer:

31) Examples of the means of authenticating a user's identity that can be used alone or in combination are;

a) Something the individual knows;

The Personal Identification Number (PIN)

The password to an account

Answer to a (complete) set of questions

b) Something the individual possesses

An ATM card

A SIM card

Other examples includes;

Physical keys to a lock

Smart cards

Electronic Key-Card used for physical entrance into an apartment

c) Something the individual is (Static biometrics)

The fingerprint

Face recognition

Retina recognition

d) Something the individual does (dynamic biometrics);

Recognition of typing rhythm

Characteristics of the users handwriting

Voice pattern recognition

32) a) Specific account attack

A specific account is targeted for the attack by the attacker attempting to gain access by submitting guesses of the account password with the aim of finding the correct password

Countermeasure;

Limiting the number of password guesses

The use of strong passwords having over 8 characters that includes special characters

Use of multi-factor authentication

b) Workstation Hijacking

The attacker takes advantage of an logged-in unattended workstation

Countermeasure;

The use of automatic lock functions that use time of inactivity on a system or the absence of a paired device

c) Password Guessing

Password guessing is the technique used while online in an attempt to prove to being the authentic particular user by means of trial and error of a user password

Countermeasure;

The use of a two or more of authentication method also known as a multi-factor authentication MFA

Explanation:


Related Questions

What is an example of a composite key in a database table?

InvoiceID
CustomerID
ProductID
OrderID + ProductID

Answers

Answer:

b

Explanation:

OrderID + ProductID is an example of a composite key in a database table. The correct option is 4.

What is composite key?

A composite key is a key in a database table that consists of two or more columns that uniquely identify each row.

In a database table, a composite key is the combination of OrderID and ProductID in a table that tracks sales transactions.

Because a single order can contain multiple products and multiple orders can contain the same product, neither column can uniquely identify a row by itself.

However, by combining the two columns, each row can be uniquely identified, ensuring that the data is accurate and complete.

Similarly, a combination of CustomerID and ProductID might be used in a sales system to track the products purchased by each customer.

Thus, the correct option is 4.

For more details regarding composite key, visit:

https://brainly.com/question/10167757

#SPJ3

HURRY GUYS I GOT 3 QUESTIONS LEFT
IM TIMED!!!!!

Which element should be used only when the content simply references the element
a. nav
b. figure
c. hgroup
d. article

Answers

the answer is b i believe

The element that should be used only when the content simply references the element is figure. The correct option is B.

What is element of referencing?

The four components of the author, date, source, and title are all included in reference list entries.

There are four referencing conventions that are frequently used. They go by the names of the Modern Languages Association (MLA), American Psychological Association (APA), Harvard, and Modern Humanities Research Association (MHRA) systems.

In computer programming, a reference is a value that allows a program to access a particular piece of data indirectly, such as the value of a variable or a record, in the computer's memory or in another storage location.

As a result, accessing the data is referred to as dereferencing the reference, and the data is referred to as the reference's referent.

Thus, the correct option is B.

For more details regarding elements of referencing, visit:

https://brainly.com/question/28270502

#SPJ2

What is the difference between PowerPoint and Outlook?

PowerPoint is a presentation program; Outlook is a personal information management application.
Outlook is a presentation program; PowerPoint is a personal information management application.
PowerPoint is a program that lets you create, edit, format, and print written documents; Outlook is a computer application that uses a grid system to organize and manipulate data.
Outlook is a program that lets you create, edit, format, and print written documents; PowerPoint is a computer application that uses a grid system to organize and manipulate data.

Answers

Answer:

PowerPoint is a presentation program; Outlook is a personal information management application.

Explanation:

Powerpoint is the program used in presentations where slides designed and then shown to the audience.

Outlook is used to display various types of personal information like calendar appointments and emails.

What is the "thinking work" of the computer? How does it help the computer?

Answers

Answer:

El pensamiento computacional es una forma de pensar que utiliza habilidades propias de las ciencias de la computación, como la descomposición y resolución de problemas, lógica, el reconocimiento de patrones y la abstracción

Explanation:

Un computador sirve para guardar los teléfonos de tus amigos, las tareas del colegio, los trabajos de tu papá y mamá y hasta las cartas que le envías a tu novia.

C++

Assume the existence of a Window class with integer data members width and height. Overload the << operator for the Window class-- i.e., write a nonmember ostream-returning function that accepts a reference to an ostream object and a constant reference to a Window object and sends the following to the ostream: 'a (width x height) window' (without the quotes and with width and height replaced by the actual width and height of the window. Thus for example, if the window had width=80 and height=20, << would send 'a (80 x 20) window' to the ostream object.) Don't forget to have the function return the proper value as well. Assume the operator has been declared a friend in the Window class.

Answers

Answer:

Following are the code to the given question:

#include <iostream>//header file

using namespace std;

class Window //defining a class Window

{

private:

int width, height;//defining integer variable

public:

friend ostream& operator << (ostream& stm, Window& width)//defining a friend function that takes two parameters

{

return stm<<"a ("<<width.width<<" x "<<width.height<<") window"; //use return keyword that return its values

}  

Window(int width, int height): width(width), height(height)//defining parameterized constructor that inherit width and height in its parameters  

{}

};

int main() //Main method

{

Window w(80,90);//calling class constructor

cout<<w;//print object value

return 0;

}

Output:

a (80 x 90) window

Explanation:

In the above code, a class "Window" is defined that uses a friend function "ostream& operator" is declared that uses the "ostrea&" as a data type to hold two-variable "stm and w" in its parameter, and declared the parameterized constructor to hold value by inheriting width and height in its parameters.

Inside the main method, a class object is created that calls the constructor and uses the print method to print object value.

what is the main reason for adding somebody into the BCC list for an email?​

Answers

Answer:

protecting email address privacy

Explanation:

for securing and privacy reasons and it is for the best

How does a filmmaker decide which events to include in a documentary?

Answers

Answer:

A documentary is a film based on facts in which the maker tries to portray an aspect of reality, such as politics, science, society or history, nature or the personal perception of the documentary maker.

Documentaries are informative in nature. Sometimes documentaries attempt to provide an objective picture of a subject. There is a lot of debate about what is objective, because the documentary maker chooses his images from reality, which is in itself a subjective act. In a creative author's documentary, the emphasis is on the subjective vision of the filmmaker.

Therefore, the documentary maker will select the events to include in the documentary according to the approach he or she wants to give to it, be it objective or subjective.

ASKING AGAIN CAUSE I GOT A WEIRD LINK

HTML5 allows web pages authors to place a/an _________ element around a block-level element that contains child elements
a. nav
b. div
c. h1
d. a

Answers

Answer:

A. Nav

Explanation:

....,..........

Which of the following refers to the informal rules for how to behave online?​

Answers

Answer:

Question: Where is the following?

Uhhhhhhhhhh picture??

100POINTS!!!!


Which tool would you use to organize the list from fewest calories to most calories?

Which tool would you use to organize the list from most protein to least protein?

Which tool would you use to show only fruits with 4 or more grams of dietary fiber?

Which tool would you use to navigate to C5, the cell containing the grams of sugar for an orange?

Answers

Answer:

Explanation:

Which tool would you use to organize the list from fewest calories to most calories?

✔ sort by calories from smallest to largest

Which tool would you use to organize the list from most protein to least protein?

✔ sort by protein from largest to smallest

Which tool would you use to show only fruits with 4 or more grams of dietary fiber?

✔ filter

Which tool would you use to navigate to C5, the cell containing the grams of sugar for an orange?

✔ Go To

The answer is in the picture

In order to multitask, a computer must have two or more processors. True or False

Answers

Answer:

False

Explanation:

:) brainliest pls

Answer:

True

Explanation:

help Which of the following triangles can be proven similar through AA?
Question 1 options:

A)

image

B)

image

Answers

A as in Ate my food ya know

Ivan has five workbooks open. he has arranged these files in a specific grouping so he can view them at the same time. In order to save these files i this specific order, ivan must create a----​

Answers

i think the answer is
folder.

Difference between Hollerith and Burroughs machine​

Answers

Explanation:

The tabulating machine was an electromechanical machine designed to assist in summarizing information stored on punched cards. Invented by Herman Hollerith, the machine was developed to help process data for the 1890 U.S. Census. Later models were widely used for business applications such as accounting and inventory control. It spawned a class of machines, known as unit record equipment, and the data processing industry.

Herman Hollerith (February 29, 1860 – November 17, 1929) was an American businessman, inventor, and statistician who developed an electromechanical tabulating machine for punched cards to assist in summarizing information and, later, in accounting. His invention of the punched card tabulating machine, patented in 1884, marks the beginning of the era of mechanized binary code and semiautomatic data processing systems, and his concept dominated that landscape for nearly a century.

Hollerith founded a company that was amalgamated in 1911 with several other companies to form the Computing-Tabulating-Recording Company. In 1924, the company was renamed "International Business Machines" (IBM) and became one of the largest and most successful companies of the 20th century. Hollerith is regarded as one of the seminal figures in the development of data processing.

Write the purpose of using computer network

Answers

Answer:

sharing resources and data between computer systems. Those shared resources would include that of data storage, printers and other devices.

Explanation:

Answer:

Explanation:Computer networks help you to connect with multiple computers together to send and receive information. Switches work as a controller which connects computers, printers, and other hardware devices. Routers help you to connect with multiple networks. It enables you to share a single internet connection and saves money.

please help thank u!!!!!

Answers

Answer:

i believe you can change slides with the arrow keys not entirely sure though

Explanation:

Answer:

using the arrows

pressing space

and clicking the mouse

Explanation:

You have a small network at home that is connected to the internet. On your home network, you have a server with the IP address of 192.168.55.199/16. You have a single public address that is shared by all hosts on your private network. You want to configure the server as a web server and allow internet hosts to contact the server to browse a personal website. What should you use to allow access

Answers

Static NAT is the answer,. :) great question BTW!

What are some other sites similar to brainly? By similar I mean being able to ask a question and answer them based on categories.

Answers

Answer:

jiskha.com

Explanation:

Answer:

Quora and Yahoo answers are alright

Explain what Fahd did wrong in the scenario below. Fahd is running ten programs at once on his laptop when it suddenly freezes up. To fix this problem, Fahd buys a new battery for his laptop.

Answers

Answer:

Well first off. if the laptop froze that doesn't mean the battery is dead to the point where a simple rest of the laptop wouldn't work out.

nadine is the systems administrator for a network with a single subnet. The subnet uses 192.168.1.0 with a mask of 255.255.255.0. The network has 10 servers running Windows Server. Srv1 currently provides both DHCP and DNS services. Nadine wants to increase the fault tolerance for her DHCP servers. She installs a new server, Srv11, and configures it for DHCP. She configures a scope on Srv11 to match the scope on Srv1 and then excludes half of the addresses in the scope on Srv1 and the other half of the addresses on the Srv11. Nadine decides to test her solution and shuts down Srv1. As a test, she forces a workstation to release its IP address and request a new one. She finds that the workstation has the IP address 169.254.0.15 with a mask of 255.255.0.0. What should Nadine do to fix the problem?

Answers

Answer:

Authorize Srv11

Explanation:

In order to fix this problem, Nadine should Authorize Srv11. The problem is most likely being caused due to failure of authorization of the server. This would prevent this server from being on the same scope as Srv1 and therefore, it is why the IPaddress being given is different. DHCP is an automatic protocol and would not be able to provide an IP address in the same scope if the server is not Authorized to do so.

Choose the tag required for each stated goal.

To style text as larger than adjacent text:








To style text as bold:








To style text as italicized:








To style text as small:

Answers

capslockbolditalicscapslock

Professional communication must be objective,
, and unemotional.

technical

informal

rational

Answers

it’s between technical and rational

Answer:

rational

Explanation:

What does input allow a computer to do

Answers

In computer science, the general meaning of input is to provide or give something to the computer, in other words, when a computer or device is receiving a command or signal from outer sources, the event is referred to as input to the device.

Which line of code will create an instance of the pet class?

class pet:
def __init__(self,strSpecies,strName):
self.species = strSpecies
self.petName = strName

myPetA = pet('dog', 'Spot'), myPetA = pet(self, 'dog', 'Spot'), myPetA = new pet('dog', 'Spot'), myPetA .pet() = 'dog', 'Spot'

Answers

Answer:

myPetA = pet(self, 'dog', 'Spot')

Explanation:

I mite be wrong

The line of code that will create an instance of the pet class is myPetA = pet (self, 'dog', 'Spot'). Option B is correct.

What is code?

Computer code, or a set of instructions or a system of rules defined in a specific programming language, is a term used in computer programming (i.e., the source code). It is also the name given to the source code after a compiler has prepared it for computer execution.

Code, often known as source code, refers to text that a computer programmer has created in a programming language. Programming languages like C, C#, C++, Java, Perl, and PHP are examples.

Another less formal term for text produced in markup or style languages, such as HTML and CSS, is code (Cascading Style Sheets)

Therefore Option B is correct.

Learn more about code:

https://brainly.com/question/17204194

#SPJ2

2. Which of the following is not one of the guidelines for using instant messaging?A.You can use in place of all face-to-face communication.
B.Keep messages short.
C.Never text or send an instant message when you are angry.
D.Use it for casual conversations.​

Answers

Answer:

A. You can use in place of all face-to-face communication.

Explanation:

Hope this helps

You are a part-time manager for The Mobile Vegan, a food truck catering to vegan diners in Portland, Oregon. Jessica Rosen, the owner of the business, wants to expand by adding other food trucks in Portland and the surrounding area. Whether she purchases new trucks or takes over an existing food truck business with an established clientele, she needs a loan to cover the cost of the trucks. She has asked for your help updating the workbook she created to analyze the loan information and forecast sales. Switch to the Loan Scenarios worksheet, and then calculate the monthly payment for the Add 1 Truck scenario as follows:
a. In cell D11, enter a formula using the PMT function to calculate the monthly payment for a loan.
b. Use the inputs listed under the Add 1 Truck loan scenario in cells D5, D7, and D9. (Hint: The result will be displayed as a negative number to reflect the negative cash flow of a loan payment.)

Answers

Answer:

i acc dont know

Explanation:

srry

Write a program that will have Tracy draw a stretched out slinky. The slinky should have: Five rings Each circle should have a radius of 35 Tracy should move forward 40 pixels after every circle

Answers

Solution :

The Tracy commands :

main.py

   circle(35)

   forward(40)

   circle(35)

   forward(40)

   circle(35)

   forward(40)

   circle(35)

   forward(40)

   circle(35)

   forward(40)

Ellie is conducting formal research for a new design project and wants to find demographic information. What source is considered most credible to use for her research?

Wikipedia articles

competitor websites

government data

magazine opinion pieces

Answers

may be wikipedia i’m sorry if it’s wrong ☹️

Answer:

Its governmental data

Explanation:

Hawaii and japan are examples of islands made by? You have to write it.

Answers

Answer:

Volcanic activity

you would use conditional formatting on a cell when you want to _____

Answers

Answer:

to format a cell based on the value in it

Explanation:

you would use conditional formatting on a cell when you want to format a cell based on the value in it.

Reason -

Conditional formatting allows you to format a cell based on the value in it.

For example, if you want to highlight all the cells where the value is less than 30 with a red color, you can do that with conditional formatting.

How would you highlight cells with negative values in it?

You can use conditional formatting.

Other Questions
Solid waste includes all of the following exceptA. agricultural wasteB. methaneC. plasticsD. food waste Leland hit the target 45 times in 50shots using a bow and arrow. Basedon his first 50 shots, what would be areasonable prediction of the numberof times Leland would hit the targetin 200 shots? Read the following sentence from the article,Yet we now pummel our ancient thinking organ with a daily deluge of digital Information that manyscientists believe may have enduring and worrisome effects.What does the verb "pummel" convey in the sentence?(A) the sense that continuous exposure to digital Information is harmful(0) the sense that most digital information people encounter is violent in nature(C) the sense that many people are starting to fight back against digital information(0) the sense that people have been made stronger by interacting with digital information 12Select the correct answer.Which scenario is an example of plagiarism?O A. Irene is writing a presentation on dolphins. When researching her section on dolphin blology, she notes the details of twoscientific articles and puts these in her reference page..Michael is writing a summary of a movie review. He puts quotation marks around the reviewer's text in his summary andIncludes the reviewer's name in parentheses.OC. Joseph is writing an essay about the Olympics. He takes a portion of a press release from the women's Olympic figure skatingteam and includes It In his Introduction in quotation marks.OD Ursula is writing a paper about New Zealand's political structure. She paraphrases a speech from New Zealand's primeminister, followed by the prime minister's name in parentheses.ResetNext Translate the following sentence into an equation using n for the unknown number. Then solve for n.when 15 is decreased by three times a number, the result is 21a.15 - 372 = 21n = -2b.312 - 15 = 21n = -2C.31 - 15 = 21n = 12d.15 - 3n2 = 21n-2 Excerpt from Oliver Twist By Charles DickensThe medical gentleman walked away todinner and the nurse, having otae moreapplied herself to the green bottle, sat downon a low chair before the fire, and proceededto dress the infant. What an excellent exampleof the power of dress, young Oliver Twist was!Wrapped in the blanket which had hithertoformed his only covering, he might have beenthe child of a nobleman or a beaglandit wouldChave been hard for the haughtiest stranger tohave assigned him his proper station in societyBut now that he was enveloped in the oldcalico robes which had grown yellow in thesame service, he was badged and ticketed,and fell into his place at once a parish child-the orphan of a workhouse-the humble, half-starved drudge to be cuffed and buffetedthrough the world-despised by all, and pitiedby noneOliver cried lustily. If he could have known thathe was an orphan left to the tender mercies ofchurch-wardens and overseers, perhaps hewould have cried the louder.Which phrase from the excerpt explains how people are judged?A. What an excellent example of the power of dress young Oliver Twist was!B.it would have been hard for the haughtiest stranger to have assigned him his proper station in societyC.in the old calico robes which had grown yellow in the same service he was bagged and ticketed, and feel into his place at once D.to be cuffed and buffeted through the world despised by all, and pitied by none Write a pseudo code to complete the factorial of 5 recursively and print the value on the screen. Ill mark brianliest You make a scale drawing of a tree using the scale 5 in. =27 ft. If the tree is 67.5 ft tall, how tall is the scale drawing? A.) 10 in B.) 11.5 in C.) 12 in D.) 12.5 in pls helppp Ill mark u brainliest!! How many moles of solute are in 53.1 mL of 12.5M HCI? who ever answers this question will get a brainlest thirWhich section of the Declaration ofIndependence explains how thegovernment is expected to treat itscitizens?Help ResourcesA. Resolution of IndependenceB. List of GrievancesC. Declaration of RightsD. Preamble The Smoot-Hawley Act, signed into law in 1930, increased U.S. tariffs to an unprecedented level of 53%, causing a sharp decline in U.S. exports. In 1934, however, changes in the U.S. trade policy enabled U.S. manufacturers to resume business with their foreign distributors. Which of the following is the most likely reason for the increase in U.S. exports after these changes?A. The president received the authority to negotiate bilateral tariff-reduction agreements with foreign governments. B. The scientific tariff was introduced, which allowed the president to increase tariff levels if foreign production costs were below those of the United States. C. Congress was given the authority to approve bilateral trade agreements. The force of Earths gravity keeps earth in orbit true or false Do you believe there is sufficient coverage of civic education in the current classroom curriculum? Explain your reasoning. a 200 L of water tank is filled from a reason the inlet pipe at the bottom electrical overflow pipe prices with colourful the bottom boats 50 50 cm in diameter how much does the water rise in the overflow pipe in the water is heated from 10 degrees Celsius to 40 degrees Celsius Why has Lake Chad changed in size over time? find 5 rational number between 2/-7 and 5/6 Define;i) Voltageii) Currentiii) Electrical Poweriv) Electrical Energy Dad spends $227.06 at the grocery store,$95.55 at the shoe store,and $35.16 at the dry cleaners how much did dad spend in all?