COMPUTER FUNDAMENTALS

COMPUTER NETWORKS AND COMMUNICATIONS

NETWORK SECURITY AND CYBERSECURITY

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Which of the following should NOT be in a security policy?
A
Authentication policies
B
Acceptable use policies
C
Incident handling policies
D
Admin passwords for equipment
Explanation: 

Detailed explanation-1: –Do not choose passwords based upon details that may not be as confidential as you’d expect, such as your birth date, your Social Security or phone number, or names of family members.-Do not use words that can be found in the dictionary.

Detailed explanation-2: -Explanation. The correct response is audit. An audit is not one of the basic components of an information security policy. The correct basic components are purpose, scope, responsibilities, and compliance.

Detailed explanation-3: -Passwords should not be stored or transmitted using weak encryption or hashing algorithms.

Detailed explanation-4: -Variety. Never use similar passwords across multiple accounts-this is a hacker’s dream since it creates a very real single point of failure. Length. Set a ten character minimum for your network passwords. Characters. Authentication. Changes. 17-Jun-2015

There is 1 question to complete.