Computers

9th -

12thgrade

Image

Activity 2.1.3 Password Strength -- Strong!

3
plays

7 questions

Show Answers
See Preview
  • 1. Fill in the Blank
    1 minute
    1 pt

    The person in this role is responsible for managing computers, networks, servers, an other computing resources. They are also the person that implements security policies for an organization. What is this IT role?

  • 2. Fill in the Blank
    1 minute
    1 pt

    What is the first line of defense in protecting personally identifiable information (PII)? It is often much weaker than necessary.

  • 3. Multiple Choice
    30 seconds
    1 pt

    Password files can be stolen from an organization and attacked on a device by trying thousands of combinations. This method of attack is the reason that we should not rely on the security of an organizations network. What is the attack method?

    Offline brute force

    Brute force

    Frequency Analysis

    Rainbow Tables

  • Answer choices
    Tags
    Answer choices
    Tags

    Explore all questions with a free account

    Already have an account?