COMPUTER NETWORKS AND COMMUNICATIONS
NETWORK SECURITY AND CYBERSECURITY
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
Authentication policies
|
|
Acceptable use policies
|
|
Incident handling policies
|
|
Admin passwords for equipment
|
Detailed explanation-1: –Do not choose passwords based upon details that may not be as confidential as you’d expect, such as your birth date, your Social Security or phone number, or names of family members.-Do not use words that can be found in the dictionary.
Detailed explanation-2: -Explanation. The correct response is audit. An audit is not one of the basic components of an information security policy. The correct basic components are purpose, scope, responsibilities, and compliance.
Detailed explanation-3: -Passwords should not be stored or transmitted using weak encryption or hashing algorithms.
Detailed explanation-4: -Variety. Never use similar passwords across multiple accounts-this is a hacker’s dream since it creates a very real single point of failure. Length. Set a ten character minimum for your network passwords. Characters. Authentication. Changes. 17-Jun-2015