COMPUTER FUNDAMENTALS

COMPUTER NETWORKS AND COMMUNICATIONS

NETWORK SECURITY AND CYBERSECURITY

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
In order to restrict access to secure data, a system of ____ should be used?
A
Passwords
B
Anti-virus software
C
Multi-user operating system
D
Single-user operating system
Explanation: 

Detailed explanation-1: -Data encryption Using encryption software is the most effective way of limiting who can view or interact with private information without impacting productivity. Instead of locking down the area where data is stored, making it harder to access, this process protects the information itself.

Detailed explanation-2: -Passwords should be easy to remember, but hard for somebody else to guess. A good rule is ‘make sure that somebody who knows you well, couldn’t guess your password in 20 attempts’. Staff should also avoid using the most common passwords, which criminals can easily guess.

Detailed explanation-3: -By combining uppercase letters with lowercase letters, numbers, and special characters such as “&” or “$” you increase the complexity of your password and decrease the chances of someone hacking into your system.

Detailed explanation-4: -Passwords should be long. Passwords should contain at least 12 characters. Passwords should contain at least 1 uppercase letter. Passwords should contain at least 1 lowercase letter. Passwords should contain at least 1 numerical character. Symbol characters are encouraged (e.g. #$%^&!.)

There is 1 question to complete.