10 Questions
What should be avoided when transmitting passwords over a network?
Clear text
What is the purpose of password verification tools and password-cracking tools?
To test passwords for weaknesses
What is the recommended duration for idle user accounts before they are disabled?
A month
What is the recommended length for strong passwords?
16 characters or more
What is the purpose of biometric authentication?
To provide unique identification
What is an example of a synchronous dynamic password token?
Token that generates a password that changes at a fixed interval
What is the purpose of Kerberos logon process?
To authenticate users and issue tickets
What is the purpose of a TGT in Kerberos?
To issue tickets for resource access
What is the recommended practice for displaying passwords on screens and forms?
Do not display passwords in any form
What is the purpose of creating lists of passwords users should avoid?
To identify weak passwords
Test your knowledge on the CIA Triad principles of Confidentiality, Integrity, and Availability, as well as the different types of access control measures, including preventive, detective, and corrective controls. Learn how to implement access control in a layered environment.
Make Your Own Quizzes and Flashcards
Convert your notes into interactive study material.
Get started for free