No student devices needed. Know more
7 questions
The person in this role is responsible for managing computers, networks, servers, an other computing resources. They are also the person that implements security policies for an organization. What is this IT role?
What is the first line of defense in protecting personally identifiable information (PII)? It is often much weaker than necessary.
Password files can be stolen from an organization and attacked on a device by trying thousands of combinations. This method of attack is the reason that we should not rely on the security of an organizations network. What is the attack method?
Offline brute force
Brute force
Frequency Analysis
Rainbow Tables
When developing a password or passphrase what should be included to make it as strong as possible?
Uppercase letters
Symbols
Spaces (if accepted)
Numbers
A random string of characters using uppercase, lowercase, symbols and numbers is a much stronger password than a meaningful passphrase.
True
False
What term matches the following definition?
To give permission, for example, to access information.
What method of computer access control only grants user access after presenting several separate pieces of evidence? This can be done by asking questions, providing an ever changing code, fingerprint, face scan, or hardware key.
Explore all questions with a free account