4.6 Password Security Flashcards

(18 cards)

1
Q

What is the primary goal when creating a password?

A

To create a password with an increased amount of entropy

Entropy describes how unpredictable a password might be.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What characteristics should an ideal password contain?

A

Uppercase letters, lowercase letters, numbers, and special characters

This combination increases the complexity and security of the password.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the recommended minimum length for a password?

A

At least eight characters

Password length requirements are increasing as processing speeds improve.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How often do many systems require password changes?

A

Every 30, 60, or 90 days

Some critical systems may require changes as frequently as every 7 to 15 days.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What happens if a password expires and is not changed?

A

The user will not be able to log in to that account.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a recommended best practice regarding passwords for multiple accounts?

A

Use a different password for each account.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the purpose of a password manager?

A

To store all of your passwords in one single database.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What additional security measures do password managers often implement?

A

Encryption of stored information and multifactor authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What feature allows password managers to help create unique passwords?

A

Automatic password generation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

True or False: Many people take full advantage of password managers.

A

False.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a potential benefit of passwordless authentication?

A

It solves the problem of password reuse.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How might you currently be using passwordless authentication?

A

Using face recognition to unlock a mobile phone.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is just-in-time permission?

A

Temporary administrative access granted for a limited time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What does just-in-time permission help mitigate?

A

The risk of an attacker gaining permanent administrator access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the role of a central clearinghouse in just-in-time permissions?

A

To allow or deny access based on set security policies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What type of credentials does the central clearinghouse manage?

A

Primary credentials for access to systems.

17
Q

What happens to temporary credentials after their use?

A

They can be deleted after the session is complete.

18
Q

Fill in the blank: The process of creating new temporary credentials based on primary credentials is called _______.

A

Just-in-time permissions.