Podcast
Questions and Answers
What should be avoided when transmitting passwords over a network?
What should be avoided when transmitting passwords over a network?
- Weak encryption
- Strong encryption
- Clear text (correct)
- Token-based authentication
What is the purpose of password verification tools and password-cracking tools?
What is the purpose of password verification tools and password-cracking tools?
- To crack passwords
- To disable idle user accounts
- To test passwords for weaknesses (correct)
- To create strong passwords
What is the recommended duration for idle user accounts before they are disabled?
What is the recommended duration for idle user accounts before they are disabled?
- A year
- A week
- A month (correct)
- A day
What is the recommended length for strong passwords?
What is the recommended length for strong passwords?
What is the purpose of biometric authentication?
What is the purpose of biometric authentication?
What is an example of a synchronous dynamic password token?
What is an example of a synchronous dynamic password token?
What is the purpose of Kerberos logon process?
What is the purpose of Kerberos logon process?
What is the purpose of a TGT in Kerberos?
What is the purpose of a TGT in Kerberos?
What is the recommended practice for displaying passwords on screens and forms?
What is the recommended practice for displaying passwords on screens and forms?
What is the purpose of creating lists of passwords users should avoid?
What is the purpose of creating lists of passwords users should avoid?