4.6.3, 2.4.14, 4.6.2 Flashcards
What is the recommended approach for creating strong passwords?
Long passwords with complex and memorable passphrases
Why is password complexity important?
It reduces the likelihood of successful brute-force attacks
What is the risk associated with password reuse?
Increase the likelihood of unauthorized access
Why should organizations implement password expiration policies?
To mitigate the impact of potential credential compromises
What is the purpose of restricting the use of old passwords?
To prevent the use of potentially compromised passwords
What do password managers do to enhance security?
Generate and store strong, unique passwords for each account
What is the primary advantage of passwordless authentication?
It reduces the reliance on passwords
What is the main purpose of a password attack?
To gain a user’s password
Why should plaintext passwords never be sent or stored?
They can be intercepted or compromised easily
What is a Brute Force attack?
An attack that tries all possible combinations until the right guess works
How does a Dictionary attack differ from a Brute Force attack?
Dictionary attacks use commonly used words or passwords from a list
What is spraying in the context of password attacks?
Trying a few passwords at a time to get lucky
How do Rainbow Tables aid in password cracking?
They precalculate a series of hashes using known algorithms
What defense measure can be used to combat rainbow table attacks?
Using a salt with passwords
What is Multifactor Authentication (MFA)?
A security process that requires users to provide two or more forms of identification
Which of the following statements about MFA is true?
MFA enhances security by requiring multiple forms of identification
What is a common example of something you have for authentication?
Security key
Which authentication factor involves unique physical or behavioral characteristics?
Something you are
What is the purpose of using authentication tokens?
To generate one-time passwords or codes
Which factor involves verifying the user’s location?
Somewhere you are
What is the primary advantage of Multifactor Authentication?
It enhances security by requiring multiple forms of identification