Ch. 9 Cybersecurity Review
14 Questions
6 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

To determine which assets to ______

protect

To determine credible threats to those ______

assets

To determine vulnerabilities that currently ______

exist

To identify the risks posed with regard to the ______

<p>assets</p> Signup and view all the answers

To recommend changes to current practice that mitigate risks to an acceptable ______

<p>level</p> Signup and view all the answers

To determine implementation ______

<p>priorities</p> Signup and view all the answers

A SYSTEM’S MAIN PROTECTION FROM BOTH EXTERNAL AND INTERNAL ATTACKS IS THE ______

<p>PASSWORD</p> Signup and view all the answers

Password ______ THE PROBLEM, SIMPLY STATED, IS THIS: PEOPLE ARE HUMAN AND ATTEMPTING TO HAVE A PERSON REMEMBER A STRONG PASSWORD IS A DIFFICULT TASK

<p>Cracking</p> Signup and view all the answers

QUITE OFTEN PASSWORDS AND USER IDS ARE: ______, USUALLY THE USER’S FIRST OR LAST NAME OR THE WORD “PASSWORD”

<p>IDENTICAL</p> Signup and view all the answers

EASY TO GUESS, SUCH AS A COMPANY NAME, VARIATIONS OF USER NAMES, OR TV CHARACTERS GUEST ACCOUNTS OR ACTIVE TERMINATED ACCOUNTS FOUND ON STICKY NOTES ATTACHED TO ______

<p>MONITORS</p> Signup and view all the answers

AUTOMATED HACKER TOOLS, SUCH AS CRACK, L0PHTCRACK, AND JOHN THE RIPPER, TEND TO BRUTE-FORCE PASSWORD ______ BUT CAN QUICKLY DETERMINE SHORT AND COMMON PASSWORDS

<p>CRACKING</p> Signup and view all the answers

ANOTHER WAY TO CRACK PASSWORDS IS VIA ______ TABLES, WHICH ARE HUGE LISTS OF PRE-ENCRYPTED PASSWORDS THAT ALLOW ALMOST INSTANTANEOUS CRACKING OF EVEN LONG, COMPLEX PASSWORDS

<p>RAINBOW</p> Signup and view all the answers

In all Microsoft Windows systems, up to and including XP, the user passwords were stored in a legacy LM format for backwards compatibility with old systems/workgroups, which turned out to be incredibly easy to ______

<p>CRACK</p> Signup and view all the answers

KEY MANAGEMENT, WHICH IS ESSENTIAL TO THE ENCRYPTION PROCESS, IS A WELL-THOUGHT-OUT SET OF ______ THAT HAS JUST NOW BECOME ADEQUATELY COST EFFECTIVE AND NON-LIMITING TO SYSTEM PERFORMANCE TO BE ACCEPTABLE TO USE IN INDUSTRIAL FACILITIES

<p>PROCESSES</p> Signup and view all the answers

Use Quizgecko on...
Browser
Browser