Information Security: CIA Triad and Access Control
10 Questions
2 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What should be avoided when transmitting passwords over a network?

  • Weak encryption
  • Strong encryption
  • Clear text (correct)
  • Token-based authentication
  • What is the purpose of password verification tools and password-cracking tools?

  • To crack passwords
  • To disable idle user accounts
  • To test passwords for weaknesses (correct)
  • To create strong passwords
  • What is the recommended duration for idle user accounts before they are disabled?

  • A year
  • A week
  • A month (correct)
  • A day
  • What is the recommended length for strong passwords?

    <p>16 characters or more</p> Signup and view all the answers

    What is the purpose of biometric authentication?

    <p>To provide unique identification</p> Signup and view all the answers

    What is an example of a synchronous dynamic password token?

    <p>Token that generates a password that changes at a fixed interval</p> Signup and view all the answers

    What is the purpose of Kerberos logon process?

    <p>To authenticate users and issue tickets</p> Signup and view all the answers

    What is the purpose of a TGT in Kerberos?

    <p>To issue tickets for resource access</p> Signup and view all the answers

    What is the recommended practice for displaying passwords on screens and forms?

    <p>Do not display passwords in any form</p> Signup and view all the answers

    What is the purpose of creating lists of passwords users should avoid?

    <p>To identify weak passwords</p> Signup and view all the answers

    More Like This

    Use Quizgecko on...
    Browser
    Browser