FUNDAMENTALS OF COMPUTER

COMPUTER THREATS SECURITY

COMPUTER SECURITY POLICIES EXAMPLES

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Basic security questions used to reset a password are susceptible to:
A
Hashing
B
Social engineering
C
Network sniffing
D
Trojan horses
Explanation: 

Detailed explanation-1: -As a form of self-service password reset, security questions have reduced information technology help desk costs. By allowing the use of security questions online, they are rendered vulnerable to keystroke logging and brute-force guessing attacks, as well as phishing.

Detailed explanation-2: -As for now, the Security Answer is not case sensitive so there is no impact if the user is defining the security answer with the first letter as upper case and when they try to use it they will paste the answer with lower case characters, as long as the answer is correct the user will pass the prompt.

Detailed explanation-3: -These questions help identify users if they forget their password for an account login. Companies use these questions to ensure the account owner is the person trying to retrieve or reset a password. Websites that utilize passwords often ask you to select more than one security question when you set up an account.

Detailed explanation-4: -Security questions are vulnerable to exploitation because they rely on knowledge-if an attacker guesses, researches, or phishes a security answer, for instance, the account is compromised. Not even the best security questions are immune to these attacks.

There is 1 question to complete.