FUNDAMENTALS OF COMPUTER

COMPUTER THREATS SECURITY

COMPUTER SECURITY POLICIES EXAMPLES

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Which of the following are not valid password controls? (Choose all that apply (I would pick two, but that is just me. You do whatever you want.))
A
Minimum Password Age
B
Maximum Password Age
C
Maximum Password Length
D
Account Lockout Threshold
Explanation: 

Detailed explanation-1: -The most common attack methods include brute forcing, dictionary attacks, password spraying, and credential stuffing. Brute forcing is the attempt to guess a password by iterating through all possible combinations of the set of allowable characters.

Detailed explanation-2: -The Minimum password age policy setting determines the period of time (in days) that a password must be used before the user can change it. You can set a value between 1 and 998 days, or you can allow password changes immediately by setting the number of days to 0.

Detailed explanation-3: -Rationale: Setting an account lockout threshold reduces the likelihood that an online password brute force attack will be successful. Setting the account lockout threshold too low introduces risk of increased accidental lockouts and/or a malicious actor intentionally locking out accounts.

Detailed explanation-4: -8. A is used to represent a password. Hash-a password hash is commonly used to represent a password in an encrypted format that is not reversible in locations such as the SAM db.

There is 1 question to complete.