0% found this document useful (0 votes)
13 views2 pages

Unit 9 Questions and Answers

Uploaded by

sixthbit
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as ODT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
13 views2 pages

Unit 9 Questions and Answers

Uploaded by

sixthbit
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as ODT, PDF, TXT or read online on Scribd
You are on page 1/ 2

### **Answer Key**

#### *MCQs*

1.What is the main purpose of authentication?


b) To verify a user’s identity before granting access

2.Which of the following is NOT a common threat to data transmission?


c) Firewall protection

3.What makes biometric authentication more secure than passwords?


b) It relies on unique physical traits (e.g., fingerprints)

4.Multi-factor authentication (MFA) typically combines:


a) Two or more independent verification methods

5.Which action helps prevent replay attacks?


b) Encrypting data and using timestamps

#### *Fill in the Blanks*

1. A ____Replay ______ attack intercepts and resends data to trick systems into accepting fraudulent
requests.
2. ____Biometric ______ authentication uses traits like fingerprints or facial recognition.

3. To create a strong password, combine uppercase letters, numbers, and ____Symbols ______.

4. The ___Authentication _______ process checks user credentials against stored records to allow
access.
5. Hackers target ____ E-commerce ______ websites (e.g., banking) for man-in-the-middle attacks.

True or Flase

1. Packet sniffing can capture passwords and emails during transmission. T


2. Biometric data (e.g., fingerprints) can be easily shared between people. F
3. Multi-factor authentication (MFA) requires only a password. F
4 .Man-in-the-middle attacks aim to steal credit card details or login information. T
5. Authentication ensures only authorized users access sensitive data. T

Short Answer Questions

1. Explain one method to secure data during transmission.

Use encryption (e.g., HTTPS) to scramble data during transmission.

2. Why is biometric authentication difficult to hack?

Biometric traits (e.g., fingerprints) are unique and cannot be easily replicated.
3. What is the role of encryption in preventing replay attacks?

Encryption ensures intercepted data is unreadable, and timestamps prevent reused data.

4. Name two examples of biometric authentication technologies.

Fingerprint scanners, facial recognition.

5. How does a man-in-the-middle attack work?

A hacker secretly intercepts and alters communication between two parties to steal data

You might also like