Multiple Choice
Compromised passwords is/ are
A) Passwords on the system known to unauthorized users
B) Acquiring passwords from storage, network transmission or user knowledge
C) Repeated attempts to authenticate using possible passwords
D) Generating character strings to match existing passwords
Correct Answer:

Verified
Correct Answer:
Verified
Q7: End-point protection defends against attacks on<br>A) Firewalls<br>B)
Q14: The de-militarized zone in the context of
Q15: Patches should always be installed as soon
Q16: Methods used by endpoint security software for
Q17: Threats to passwords include<br>A) Password guessing<br>B) Password
Q18: A PIN is<br>A) A short numerical password<br>B)
Q20: Password management is<br>A) A list of permissions
Q22: An ACL is<br>A) The process of defining,
Q23: A password policy is<br>A) A set of
Q24: In enterprise networks, power users can facilitate