FUNDAMENTALS OF COMPUTER

COMPUTER THREATS SECURITY

TYPES OF COMPUTER SECURITY

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Which of the following best describes strong password practices?
A
You can use the same “all-purpose” password on multiple sites if they do not contain your private information.
B
Passwords should contain no personal identifying information such as a birthdate or pet name.
C
Ideal password length should be 4 to 6 characters.
D
Passwords should contain no punctuation or symbols.
Explanation: 

Detailed explanation-1: -You can use the same “all-purpose” password on multiple sites if they do not contain your private information. Passwords should contain no personal identifying information such as a birthdate or pet name.

Detailed explanation-2: -Strong passwords should also be at least seven characters long and contain characters from each of the following groups: Uppercase letters A, B, C … Lowercase letters z, y, x … Numeric digits 0, 1, 2, 3, 4, 5, 6, 7, 8, or 9.

Detailed explanation-3: -A strong password is: At least 12 characters long but 14 or more is better. A combination of uppercase letters, lowercase letters, numbers, and symbols. Not a word that can be found in a dictionary or the name of a person, character, product, or organization.

Detailed explanation-4: -A strong password is at least eight characters long, and is a combination of alphanumeric characters and punctuation marks.

There is 1 question to complete.