Podcast
Questions and Answers
Which of the following is the most common form of authentication?
Which of the following is the most common form of authentication?
- PIN codes
- Passwords (correct)
- Two-factor authentication
- Biometrics
What is a key vulnerability of passwords if they are created without complexity requirements?
What is a key vulnerability of passwords if they are created without complexity requirements?
- They are easily forgotten
- They are susceptible to brute force attacks (correct)
- They are easily hacked
- They are difficult to type
What do password managers do?
What do password managers do?
- Allow manual password synchronization
- Store all of the user's passwords (correct)
- Generate strong passwords
- Protect against brute force attacks