Attachment 3
Attachment 3
Attachment 3
Learning Topic
Authentication
Authentication is the process by which credentials are presented and
validated to enable access. There are a number of different methods of
authentication. Passwords are the most common type of authentication
and are usually coupled with user identification (user IDs). Tokens and
certificates are often used in place of passwords to provide a higher level
of security. Tokens can contain unique identifiers (e.g., digital signatures
or keys). Tokens can also store biometric data—for example, fingerprints.
1 of 11 4/24/2021, 8:44 PM
Authentication https://leocontent.umgc.edu/content/umuc/tgs/cst/cst620/2212/learning-t...
Resources
Required
Recommended
2 of 11 4/24/2021, 8:44 PM
Authentication https://leocontent.umgc.edu/content/umuc/tgs/cst/cst620/2212/learning-t...
Biometrics (/content/umuc/tgs/cst/cst620
/2212/learning‐resource‐
list/biometrics.html?ou=546459)
Authentication (/content/umuc/tgs/cst/cst620
/2212/learning‐resource‐
list/authentication.html?ou=546459)
3 of 11 4/24/2021, 8:44 PM
Authentication https://leocontent.umgc.edu/content/umuc/tgs/cst/cst620/2212/learning-t...
/TowardsSecureandDependableMessageAuthentica
tioninWSN.pdf?ou=546459)
4 of 11 4/24/2021, 8:44 PM
Authentication https://leocontent.umgc.edu/content/umuc/tgs/cst/cst620/2212/learning-t...
one‐time password
static password
dynamic password
passphrase password
Question 2
When a message is encrypted, it provides for which of the
following?
confidentiality
nonrepudiation
authentication
authorization
Question 3
If you digitally sign a message, which of the following are
5 of 11 4/24/2021, 8:44 PM
Authentication https://leocontent.umgc.edu/content/umuc/tgs/cst/cst620/2212/learning-t...
covered?
authentication
nonrepudiation
integrity
Question 4
When employees access the company network via remote
access, which of the following provides the most reliable
authentication?
Question 5
Point‐to‐point authentication protocols include which of
the following?
6 of 11 4/24/2021, 8:44 PM