11-1 Flashcards

1
Q

policies regarding how many login attempts should be allowed before the account is locked

A

access lockout policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

a policy in which the company provides te device and has complete control over it

A

COPE (Company Owned and Provided Equipment)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A policy of permitting employees to bring personally owned devices to their workplace and to use those devices to access privileged company information and applications

A

BYOD (Bring Your Own Device)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

a policy wherin the company allows the employees to bring their own device but only if that device is from a list of preapproved devices

A

CYOD (Choose Your Own Device)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

a table that contains all the possible hashes of all the key combinations that might have been used in a password up to a given size.

A

Rainbow Table

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

good user policies outline specifically how people may or may not use __________

A

systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

every organization must have specific policies that will be applied _______ across the organization

A

fairly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

areas of potential misuse are also covered by user policies, including

A

password sharing,
copying data,
leaving accounts on while employees go to lunch,
etc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

a good password has been defined as one with 6 - 8 ________, uses numbers and special characters, with no obvious relevance to the __________

A

characters // end user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

it is also uncommon for employees to _________ passwords

A

share

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

issues such as password length, __________ are issues of administrative policies

A

age, history

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

passwords should never to be kept writen down, or shared. if a password is compromised then the user should contact __________ immediatley

A

IT administrator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

choose a passphrase and replace all the E’s with_________ could be a good idea for a secure password. this complexity requirement helps to prevent ___________

A

3’s, dictionary attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Hashing passwords leads to the use of an interesting technique called the ___________

A

rainbow table.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

a user should open an attachment only if it meets the following criteria

A

it was expected
if its not expected, it came from an open source
appears to be legitimate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly