Information Security: CIA Triad and Access Control
10 Questions
2 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What should be avoided when transmitting passwords over a network?

  • Weak encryption
  • Strong encryption
  • Clear text (correct)
  • Token-based authentication

What is the purpose of password verification tools and password-cracking tools?

  • To crack passwords
  • To disable idle user accounts
  • To test passwords for weaknesses (correct)
  • To create strong passwords

What is the recommended duration for idle user accounts before they are disabled?

  • A year
  • A week
  • A month (correct)
  • A day

What is the recommended length for strong passwords?

<p>16 characters or more (D)</p> Signup and view all the answers

What is the purpose of biometric authentication?

<p>To provide unique identification (B)</p> Signup and view all the answers

What is an example of a synchronous dynamic password token?

<p>Token that generates a password that changes at a fixed interval (A)</p> Signup and view all the answers

What is the purpose of Kerberos logon process?

<p>To authenticate users and issue tickets (C)</p> Signup and view all the answers

What is the purpose of a TGT in Kerberos?

<p>To issue tickets for resource access (A)</p> Signup and view all the answers

What is the recommended practice for displaying passwords on screens and forms?

<p>Do not display passwords in any form (D)</p> Signup and view all the answers

What is the purpose of creating lists of passwords users should avoid?

<p>To identify weak passwords (C)</p> Signup and view all the answers

More Like This

Use Quizgecko on...
Browser
Browser