Podcast
Questions and Answers
What is the success rate of Spear Phishing?
What is the success rate of Spear Phishing?
- 45%
- 55%
- 25%
- 35% (correct)
Two-factor authentication is more secure than three-factor authentication.
Two-factor authentication is more secure than three-factor authentication.
False (B)
What is the purpose of salting in password storage?
What is the purpose of salting in password storage?
To prevent rainbow table attacks
According to the password policy, users should use at least ______ random Diceware words for a single salted 100K hashed password.
According to the password policy, users should use at least ______ random Diceware words for a single salted 100K hashed password.
Match the following authentication factors with their descriptions:
Match the following authentication factors with their descriptions:
What is the primary goal of social engineering?
What is the primary goal of social engineering?
Three-factor authentication requires something you are.
Three-factor authentication requires something you are.
How many guesses per second can a GPU make when cracking an 8-character password?
How many guesses per second can a GPU make when cracking an 8-character password?
What is the principle of granting only the minimum authority needed?
What is the principle of granting only the minimum authority needed?
It's recommended to use a VPN from public access points.
It's recommended to use a VPN from public access points.
What is the purpose of DNS Domain Name System?
What is the purpose of DNS Domain Name System?
Permissions for ICT developers on a production server are typically _______.
Permissions for ICT developers on a production server are typically _______.
What is the purpose of a Domain Validation (DV) certificate?
What is the purpose of a Domain Validation (DV) certificate?
Match the following security tools with their purpose:
Match the following security tools with their purpose:
It's a good idea to use the same password across multiple systems.
It's a good idea to use the same password across multiple systems.
What is the recommendation for using SuperUser (sudo) or root privileges?
What is the recommendation for using SuperUser (sudo) or root privileges?
What is the primary issue with 4-digit PINs used by banks and credit cards as 2FA?
What is the primary issue with 4-digit PINs used by banks and credit cards as 2FA?
Using a passphrase with 64 characters or more is considered insecure.
Using a passphrase with 64 characters or more is considered insecure.
What is the recommended storage format for passwords?
What is the recommended storage format for passwords?
According to NIST SP 800-63B Appendix A, password expiration should be based on _______________________, not time.
According to NIST SP 800-63B Appendix A, password expiration should be based on _______________________, not time.
What is a recommended alternative to passwords?
What is a recommended alternative to passwords?
Two-factor authentication provides three layers of security.
Two-factor authentication provides three layers of security.
Match the following authentication methods with their descriptions:
Match the following authentication methods with their descriptions:
What is the main objective of security in the context of authentication?
What is the main objective of security in the context of authentication?
What is the recommended way to generate a strong password?
What is the recommended way to generate a strong password?
Diceware is a method of generating strong, unique, and memorable passwords.
Diceware is a method of generating strong, unique, and memorable passwords.
What is the recommended approach to managing UserIDs across multiple accounts?
What is the recommended approach to managing UserIDs across multiple accounts?
_____________ is a service that allows users to authenticate with multiple sites using a single account.
_____________ is a service that allows users to authenticate with multiple sites using a single account.
Match the following password strength meters with their features:
Match the following password strength meters with their features:
What is the recommended way to use a password manager?
What is the recommended way to use a password manager?
Two-factor authentication is a sufficient security measure to protect against all types of attacks.
Two-factor authentication is a sufficient security measure to protect against all types of attacks.
What is the benefit of using a Diceware PassPhrase?
What is the benefit of using a Diceware PassPhrase?
What is the most common cracking method?
What is the most common cracking method?
Using the same password across multiple sites is secure.
Using the same password across multiple sites is secure.
What is the primary weakness of knowledge-based authentication?
What is the primary weakness of knowledge-based authentication?
A strong password should have at least one ___________ character.
A strong password should have at least one ___________ character.
What is a problem with the password '13qeadzc@$WRSFXV'?
What is a problem with the password '13qeadzc@$WRSFXV'?
A good password policy requires periodic changes to passwords.
A good password policy requires periodic changes to passwords.
Match the following password characteristics with their descriptions:
Match the following password characteristics with their descriptions:
What is a recommended approach to password defense?
What is a recommended approach to password defense?
Flashcards are hidden until you start studying
Study Notes
Password Security
- Nymi band uses fingerprint, facial recognition, ECG, and heartbeat pattern for authentication.
- PINs are insecure, with most people using a date to make them memorable, resulting in a limited range of 700 possibilities.
Better Password Policies
- User ID should be impersonal, not an email address.
- Passphrase should be 8-10-12-15 characters in length, with no complexity rules.
- Password expiration should be based on risk, not time.
- Reusing passwords should not be allowed.
- Block simple dictionary, commonly used, and previously breached passwords.
- Require two-factor ID, such as Microsoft Authenticator or U2F.
Password Storage
- Store passwords in a salted and hashed format using a standard library with Argon2id or PBKDF2.
- Do not invent your own password storage method.
- Obscurity does not equal security.
Password Alternatives
- Use a passkey instead of a password, starting with Microsoft or Google FIDO2.
- Use a hardware-based passkey with biometric authentication.
Security and Privacy
- Authentication should use multi-factor authentication (MFA).
- A strong password can be long, memorable, and satisfy bad rules.
- Generate a long random passphrase and check its strength and entropy.
Password Defense
- Check if a password has been previously breached or leaked.
- Use an email alias for the UserID.
- Use a password manager to generate unique, long, random, and strong passwords.
- Use a Diceware passphrase generator for long, memorable, and random passwords.
Password Managers
- Use a password manager such as 1Password, BitWarden, or MS Authenticator.
- Password managers can generate unique, long, random, and strong passwords for each account.
Authentication
- OpenID Connect authenticates users to multiple sites via a single account.
- Read the permissions requested to the authorization account.
Weak Passwords
- Weak passwords are guessable or reused across sites.
- Top three weak passwords are 123456, admin, and 12345678.
- Credential stuffing and cracking are common attacks.
Password Recovery
- "I forgot my password" relies on the strength of the email account's security and password.
- Answer security questions with lies to protect your identity.
Password Edit Rules
- Bad password rules include length, strength, and complexity requirements.
- Good password rules include using a passphrase and limiting password changes.
Authorization
- Authorization is the process of granting access rights to users.
- Role-based access control (RBAC) grants minimum authority needed for job functions.
- Permissions should be specific for each role and server.
Internet and Browser Security
- Use a DNS service that blocks malware and malicious domains.
- Use a VPN when accessing public networks.
- Always use HTTPS for sign-on.
- Use browser extensions to block tracking and test browser security.
Social Engineering
- Social engineering is a common attack method that uses social media to guess passwords and security questions.
- Be cautious when sharing personal information online.
- Use two-factor authentication to protect against phishing and cracking.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.