What is the best approach to establishing strong security with passwords Quizlet

BIOS/UEFI passwords improve the security of a workstation. These low-level passwords may, for example, prevent unauthorized users to proceed when the computer is powered on, or restrict the scope of changes a user can make in the BIOS/UEFI interface. A type of BIOS/UEFI password with the highest level of permissions is known as supervisor or administrator password; the other type of password is user password.
True
False

Recommended textbook solutions

What is the best approach to establishing strong security with passwords Quizlet

Human Resource Management

15th EditionJohn David Jackson, Patricia Meglich, Robert Mathis, Sean Valentine

249 solutions

What is the best approach to establishing strong security with passwords Quizlet

Social Psychology

10th EditionElliot Aronson, Robin M. Akert, Samuel R. Sommers, Timothy D. Wilson

525 solutions

What is the best approach to establishing strong security with passwords Quizlet

Service Management: Operations, Strategy, and Information Technology

7th EditionJames Fitzsimmons, Mona Fitzsimmons

103 solutions

What is the best approach to establishing strong security with passwords Quizlet

Anderson's Business Law and the Legal Environment, Comprehensive Volume

23rd EditionDavid Twomey, Marianne Jennings, Stephanie Greene

369 solutions

Home

Subjects

Expert solutions

Create

Log in

Sign up

Upgrade to remove ads

Only ₩37,125/year

  1. Social Science
  2. Sociology

  • Flashcards

  • Learn

  • Test

  • Match

  • Flashcards

  • Learn

  • Test

  • Match

Terms in this set (50)

Whereas phishing involves sending millions of generic e-mail messages to users, ____ targets only specific users.

spear phishing

Grouping individuals and organizations into clusters or groups based on their likes and interests is called ____.

social networking

A ____ is a program that lets a user create and store multiple strong passwords in a single user database file that is protected by one strong master password.

password management application

The best approach to establishing strong security with passwords is to use a ____.

password management tool

FACTA grants consumers free access to their credit score.

FALSE

The ____ of 2003 contains rules regarding consumer privacy.

Fair and Accurate Credit Transactions Act

once an authorized person opens the door then virtually any number of individuals can follow behind and also enter the building or area

tailgating

process that confirms a user's identity

authenication

WUuAxB2aWBndTf7MfEtm is an example of this

strong passwords

means of gathering information for an attack by relying on the weaknesses of individuals

soical engineering

trying to guess a password through combining a systematic combination of characters

bruce force attack

any secret combination of letters, numbers, and/or symbols that serves to validate or authenticate a user by what she knows

password

information entered is observed by another person

shoulder surfing

one type of spear phishing

whaling

use of a telephone call instead of e-mail to contact a potential victim

vishing

Technically speaking, the process for creating a password digital representation is based on a hash algorithm, which creates a(n) ____________________.

digest

Social engineering ____ means to create a fictitious character and then play out the role of that person on a victim.

impersonation

FACTA grants consumers the right to request one free credit report from each of the three national credit-reporting firms every ____.

12 months

The average phishing site only exists for ____ days to prevent law enforcement agencies from tracking the attackers.

3.8

A ____ is a numerical measurement used by lenders to assess a consumer's creditworthiness.

credit score

Instead of asking the user to visit a fraudulent Web site, ____ automatically redirects the user to the fake site.

pharming

The Web sites that facilitate linking individuals with common interests and function as an online community of users are called ____.

social networking sites

Passwords are still considered a strong defense against attackers.

true

____ involves using someone's personal information, such as a Social Security number, to establish bank or credit card accounts that are then left unpaid, leaving the victim with the debts and ruining their credit rating.

identity theft

There is a straightforward and easy solution to securing computers.

False

Attack tools can initiate new attacks without any human participation, thus increasing the speed at which systems are attacked.

True

Today, many attack tools are freely available and do not require any technical knowledge to use.

True

Financial cybercrime is often divided into two categories. The first category focuses on individuals and businesses.

True

In a well-run information security program, attacks will never get through security perimeters and local defenses.

False

On average it takes ____ days for a victim to recover from an attack.

ten

In the last year, over 600,000 Apple Macs were infected with a malicious software called ____.

Flashback

"____" involves breaking into a car's electronic system.

Car hacking

From January 2005 through July 2012, over ____ electronic data records in the United States were breached, exposing to attackers a range of personal electronic data, such as address, Social Security numbers, health records, and credit card numbers.

562 million

Attackers today use common Internet ____ and applications to perform attacks, making it difficult to distinguish an attack from legitimate traffic.

protocols

Security ____ convenience.

is inversely proportional to

The term ____ is frequently used to describe the tasks of securing information that is in a digital format.

information security

____ ensures that information is correct and no unauthorized person or malicious software has altered that data.

Integrity

____ ensures that data is accessible when needed to authorized users.

Availability

Information (contained on the devices) is protected by three layers: products, ____, and policies and procedures.

people

A(n) ____ is a type of action that has the potential to cause harm.

threat

A(n) ____ is a person or element that has the power to carry out a threat.

threat agent

A(n) ____ is a flaw or weakness that allows a threat agent to bypass security.

vulnerability

____ involves stealing another person's personal information, such as a Social Security number, and then using the information to impersonate the victim, generally for financial gain.

Identity theft

Under____, healthcare enterprises must guard protected health information and implement policies and procedures to safeguard it, whether it be in paper or electronic format.

HIPAA

____ requires banks and financial institutions to alert customers of their policies and practices in disclosing customer information.

GLBA

The FBI defines ____ as any "premeditated, politically motivated attack against information, computer systems, computer programs, and data which results in violence against non-combatant targets by sub-national groups or clandestine agents."

cyberterrorism

In the past, the term ____ was commonly used to refer to a person who uses advanced computer skills to attack computers.

hacker

____ are individuals who want to attack computers yet they lack the knowledge of computers and networks needed to do so.

Script kiddies

A computer ____ is a person who has been hired to break into a computer and steal information.

spy

Terrorists who turn their attacks to the network and computer infrastructure to cause panic among citizens are known as ____.

cyberterrorists

Other sets by this creator

Infectious Disease (Canine & Feline)

13 terms

pre-rvtPlus

Rodent, small mammal, reptile radiography

28 terms

pre-rvtPlus

Equine Acupuncture Points (Req'd for Exa…

153 terms

pre-rvtPlus

Recommended textbook solutions

What is the best approach to establishing strong security with passwords Quizlet

Assembly Language for x86 Processor

7th EditionKip R Irvine

359 solutions

What is the best approach to establishing strong security with passwords Quizlet

Assembly Language for x86 Processors

7th EditionKip R Irvine

359 solutions

What is the best approach to establishing strong security with passwords Quizlet

C++ for Engineers and Scientists

4th EditionGary J Bronson

732 solutions

What is the best approach to establishing strong security with passwords Quizlet

Introduction to Java Programming, Comprehensive Version

10th EditionY. Daniel Liang

1,626 solutions

Other Quizlet sets

Pharm 100 Practice Questions

57 terms

MorganSaker

The Great Depression

20 terms

Alma_Lopez72

Ch.52 Fluids and Electrolytes (Fluid and Electroly…

10 terms

Elinah_DielPlus

Stryker Interview

38 terms

jennademar

Which of the following is the best way to create a strong password quizlet?

Which of the following is the best way to create a strong password? Use a long and unique passphrase.

What is the first step in creating a strong password quizlet?

What is the first step in creating a strong password? Choose a phrase that's easy to remember.
An industry recommendation for password structure and strength that specifies passwords should be at least 10 characters long and contain at least one uppercase letter, one lower case letter, one number, and one special character.

When creating passwords the most important principle is that length is more important than complexity True or false?

Probably not. Complex passwords, often tend to be shorter than passphrases, for example, and a brute-force attack with tools that quickly try all possible combinations of keys until they get it right might easily break them as the shorter the password, the smallest the number of possible combinations.