#1
Which of the following is NOT a recommended practice for password management?
Storing passwords in plain text documents
ExplanationStoring passwords in plain text documents exposes them to easy exploitation.
#2
What does 'phishing' refer to in the context of password security?
A method used to steal sensitive information by impersonating a trustworthy entity
ExplanationPhishing involves tricking users into divulging sensitive information by masquerading as a trustworthy source.
#3
What is the recommended minimum length for a strong password?
8 characters
ExplanationA minimum length of 8 characters is recommended for strong passwords.
#4
What is the purpose of password entropy?
To measure the strength of a password
ExplanationPassword entropy quantifies the randomness and strength of a password.
#5
What is the principle of least privilege in password security?
Granting users the least amount of access necessary for them to perform their duties
ExplanationLeast privilege restricts users to the minimum access required, minimizing potential security risks.
#6
What is the main risk associated with using easily guessable passwords?
Increased vulnerability to brute force attacks
ExplanationEasily guessable passwords are vulnerable to brute force attacks, where attackers systematically try various combinations.
#7
What is the purpose of using password salting in hashing?
To make the hash output unique even for the same password
ExplanationSalting in hashing ensures that even identical passwords generate different hash outputs, enhancing security.
#8
Which of the following is NOT a recommended practice for creating strong passwords?
Using easily guessable information, like birthdates or names
ExplanationUsing easily guessable information increases the vulnerability of passwords to attacks.
#9
What is the term for a program that systematically checks all possible passwords until the correct one is found?
Brute force attack
ExplanationA brute force attack exhaustively tries all possible combinations of characters to find the correct password.
#10
Which of the following is a characteristic of a strong password?
Contains a combination of uppercase letters, lowercase letters, numbers, and special characters
ExplanationA strong password includes diverse elements like uppercase and lowercase letters, numbers, and special characters.
#11
What is the purpose of using a password manager?
To automatically generate and store complex passwords
ExplanationPassword managers simplify password management by generating and securely storing complex passwords.
#12
What is the recommended frequency for changing passwords?
Every few months or as needed
ExplanationPasswords should be changed regularly, typically every few months or when there is suspicion of compromise.
#13
What is the purpose of using multi-factor authentication (MFA)?
To increase security by requiring multiple forms of identification
ExplanationMFA enhances security by demanding multiple identification methods, reducing the risk of unauthorized access.
#14
What is the purpose of password hashing?
To convert passwords into irreversible strings of characters
ExplanationPassword hashing converts passwords into irreversible forms, enhancing security.
#15
What is the difference between symmetric and asymmetric encryption in password security?
Symmetric encryption uses one key, while asymmetric encryption uses two keys
ExplanationSymmetric encryption uses a single key for encryption and decryption, whereas asymmetric encryption uses distinct keys for each operation.
#16
What is the primary goal of password security?
To protect sensitive information from unauthorized access
ExplanationPassword security aims to safeguard sensitive data from unauthorized access or breaches.
#17
What is the concept of password rotation?
Changing passwords frequently to minimize the risk of compromise
ExplanationPassword rotation involves changing passwords regularly to reduce the likelihood of compromise.
#18
What is the purpose of password blacklisting?
To block the use of commonly used or easily guessable passwords
ExplanationPassword blacklisting prevents the use of passwords that are commonly known or easily guessed.
#19
What is the role of biometric authentication in password security?
To use physical characteristics for user identification
ExplanationBiometric authentication verifies user identity using physical attributes like fingerprints or facial recognition.
#20
What is the role of salting in password security?
Enhancing security by adding random data to passwords before hashing
ExplanationSalting adds randomness to passwords before hashing, increasing their security against various attacks.
#21
What is a common method for protecting passwords during transmission over the internet?
Using HTTPS (HTTP Secure)
ExplanationHTTPS encrypts data during transmission, safeguarding passwords from interception.
#22
What is the purpose of a password policy?
To standardize password requirements and practices within an organization
ExplanationPassword policies establish uniform standards for password creation and management across an organization.
#23
Why is it important to avoid using the same password for multiple accounts?
It reduces the risk if one account is compromised
ExplanationUsing unique passwords for each account lowers the risk of widespread compromise if one account is breached.
#24
Why is it important to avoid using personal information in passwords?
Personal information increases the likelihood of social engineering attacks
ExplanationUsing personal information in passwords makes them vulnerable to social engineering tactics aimed at gaining unauthorized access.