COMPUTER THREATS SECURITY
COMPUTER SECURITY POLICIES EXAMPLES
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
Minimum Password Age
|
|
Maximum Password Age
|
|
Maximum Password Length
|
|
Account Lockout Threshold
|
Detailed explanation-1: -The most common attack methods include brute forcing, dictionary attacks, password spraying, and credential stuffing. Brute forcing is the attempt to guess a password by iterating through all possible combinations of the set of allowable characters.
Detailed explanation-2: -The Minimum password age policy setting determines the period of time (in days) that a password must be used before the user can change it. You can set a value between 1 and 998 days, or you can allow password changes immediately by setting the number of days to 0.
Detailed explanation-3: -Rationale: Setting an account lockout threshold reduces the likelihood that an online password brute force attack will be successful. Setting the account lockout threshold too low introduces risk of increased accidental lockouts and/or a malicious actor intentionally locking out accounts.
Detailed explanation-4: -8. A is used to represent a password. Hash-a password hash is commonly used to represent a password in an encrypted format that is not reversible in locations such as the SAM db.