4.6.3, 2.4.14, 4.6.2 Flashcards

1
Q

What is the recommended approach for creating strong passwords?

A

Long passwords with complex and memorable passphrases

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Why is password complexity important?

A

It reduces the likelihood of successful brute-force attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the risk associated with password reuse?

A

Increase the likelihood of unauthorized access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Why should organizations implement password expiration policies?

A

To mitigate the impact of potential credential compromises

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the purpose of restricting the use of old passwords?

A

To prevent the use of potentially compromised passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What do password managers do to enhance security?

A

Generate and store strong, unique passwords for each account

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the primary advantage of passwordless authentication?

A

It reduces the reliance on passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the main purpose of a password attack?

A

To gain a user’s password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Why should plaintext passwords never be sent or stored?

A

They can be intercepted or compromised easily

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a Brute Force attack?

A

An attack that tries all possible combinations until the right guess works

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How does a Dictionary attack differ from a Brute Force attack?

A

Dictionary attacks use commonly used words or passwords from a list

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is spraying in the context of password attacks?

A

Trying a few passwords at a time to get lucky

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How do Rainbow Tables aid in password cracking?

A

They precalculate a series of hashes using known algorithms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What defense measure can be used to combat rainbow table attacks?

A

Using a salt with passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is Multifactor Authentication (MFA)?

A

A security process that requires users to provide two or more forms of identification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following statements about MFA is true?

A

MFA enhances security by requiring multiple forms of identification

17
Q

What is a common example of something you have for authentication?

A

Security key

18
Q

Which authentication factor involves unique physical or behavioral characteristics?

A

Something you are

19
Q

What is the purpose of using authentication tokens?

A

To generate one-time passwords or codes

20
Q

Which factor involves verifying the user’s location?

A

Somewhere you are

21
Q

What is the primary advantage of Multifactor Authentication?

A

It enhances security by requiring multiple forms of identification