A+ Guide To It Technical Support
10th Edition
ISBN: 9780357108291
Author: ANDREWS, Jean.
Publisher: Cengage,
expand_more
expand_more
format_list_bulleted
Concept explainers
Expert Solution & Answer
Chapter 17, Problem 1TC
Explanation of Solution
Given:
A password for a system is PINE963$&apple, which is not a strong password.
To find:Â The reason why PINE963$&apple cannot be treated as a strong password.
Solution:
PINE963$&apple is not a strong password because this password contains words that can be easily guessed by an attacker.
A strong password contains at least 16 characters.
The password should not contain words that can be found in a dictionary. The password: PINE963$&apple, has two dictionary words PINE and apple.
A strong password contains a combination of uppercases and lowercases letters, numbers, and symbols.
A strong password does not use adjacent keys present on the keyboard.
Want to see more full solutions like this?
Subscribe now to access step-by-step solutions to millions of textbook problems written by subject matter experts!
Students have asked these similar questions
Chelsea is a hacker who befriends Adele McCain over lunch at the cafeteria. Adele is the senior associate of Spandangle Ltd., a private law firm based in Alabama. Chelsea manages to successfully guess Adele's password to a sensitive database in the law firm. What kind of password attack did she use?
D Question 2
10 pts
Which of the following definitions of salt is correct?
It is the hash value
It is an encoded password
It is a random number
It is the original password
What is "single point of failure" in regards to passwords?
Chapter 17 Solutions
A+ Guide To It Technical Support
Knowledge Booster
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.Similar questions
- Why is having a database of encrypted passwords better than hashing passwords that are kept in a file?arrow_forwardWhat's the difference between keeping hashed passwords in a file and having an encrypted password database on a computer?arrow_forwardSOLVE STEP BY STEP PLEASE THANKS! A website password is made up of 8 characters, of which at least 2 must be letters (uppercase or lowercase, assume there are 26 of each), at least 2 must be decimal digits (0 to 9) and at least 2 must be special characters (assume there are 24 special characters). In how many ways can the password be chosen if repeating characters is allowed and it is case sensitive?arrow_forward
- Based on your Student number last digit, discuss the following blockchain topics. my student ID is (204308919)0 Blockchain Security1 Blockchain & Decentralization2 Blockchain Scalability3 Blockchain & Cryptography4 Blockchain Consensus5 Blockchain & Regulation6 Smart contracts 7Blockchain Interoperability8 Blockchain & Privacy9 Blockchain development.arrow_forwardYou are creating an app that will allow university students to connect with advisors and other students to discuss stressful situations. Only students who attend the university can access the app. Which two steps should you take to protect student’s identity and personal information? (Choose two.) Group of answer choices Hash student data transmissions with a random salt. Hash the password using an algorithm in the Google database Hash the password with a random salt. Encrypt the password. Encrypt student data transmissions.arrow_forwardDifferent from browser-based password managers, standalone password managers are designed to be used without the need for an internet connection. Do you have a suggestion for me? Why?arrow_forward
- (6) Identify the strong password from the passwords given below a. $a1al@h1 b. a123abcd c. abcd1234 d. salalaharrow_forwardIn terms of access control, what is a "subject?" A person with an invalid user account O The entity that requests and receives information O The entity that provides or hosts information O The information that is provided by an "object" With the principle of least privilege, what type of activity are you actually trying to encourage in the hopes of detecting insider attacks? O dictionary attacks O collusion O nepotism O permission creep In terms of access control, what is an "object?" O The entity that requests and receives information O A detective access control O The entity that provides or hosts information O A preventative access controlarrow_forwardWhat is the difference between hashing passwords stored in a file and saving them in a password database that is encrypted?arrow_forward
- What is the difference between keeping hashed passwords in a file and using a computer to store an encrypted password database?arrow_forwardSub:- Cyber security 9 Permissions at the OU level Right Click OU USA and select delegation control to start the wizard. In the wizard select the group staff, select reset user password and force password change at next logon Note: you are doing this at the OU level thus if you had 1000 users this reset would make all 1000 users change there passwords at next logon.arrow_forwardQ2: Explain the suitability or unsuitability of the following passwords: Qwerty Einstein wysiwyg (for “what you see is what you get”) drowssap KVK 919 Florida *laptop_admin# cr@zyp@ssarrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- A+ Guide To It Technical SupportComputer ScienceISBN:9780357108291Author:ANDREWS, Jean.Publisher:Cengage,
A+ Guide To It Technical Support
Computer Science
ISBN:9780357108291
Author:ANDREWS, Jean.
Publisher:Cengage,