Activity 2.1.3 Password Strength -- Strong!

Quiz
•
Computers
•
9th - 12th Grade
•
Hard
Andrew Griffin
Used 4+ times
FREE Resource
7 questions
Show all answers
1.
FILL IN THE BLANK QUESTION
1 min • 1 pt
The person in this role is responsible for managing computers, networks, servers, an other computing resources. They are also the person that implements security policies for an organization. What is this IT role?
2.
FILL IN THE BLANK QUESTION
1 min • 1 pt
What is the first line of defense in protecting personally identifiable information (PII)? It is often much weaker than necessary.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Password files can be stolen from an organization and attacked on a device by trying thousands of combinations. This method of attack is the reason that we should not rely on the security of an organizations network. What is the attack method?
Offline brute force
Brute force
Frequency Analysis
Rainbow Tables
4.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
When developing a password or passphrase what should be included to make it as strong as possible?
Uppercase letters
Symbols
Spaces (if accepted)
Numbers
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A random string of characters using uppercase, lowercase, symbols and numbers is a much stronger password than a meaningful passphrase.
True
False
Answer explanation
You may have heard that random letters, numbers, and symbols such as Gp3fC0#2nP make a good password. It is certainly better than qwerty or password, but a passphrase is still much better. A handful of normal words, randomly associated but meaningful to you make for a good passphrase; perhaps looking around your classroom, something like blue backpack and green chairs is meaningful to you. According to the National Institute of Standards and Technology (NIST), with so many characters, it would take about 1,050,000 times more effort to crack this passphrase than the ten-character password, even without numbers and symbols. With a bit of tweaking, the passphrase my1bluebackpack&6greenchairs makes for an excellent passphrase.
6.
FILL IN THE BLANK QUESTION
1 min • 1 pt
What term matches the following definition?
To give permission, for example, to access information.
7.
FILL IN THE BLANK QUESTION
1 min • 1 pt
What method of computer access control only grants user access after presenting several separate pieces of evidence? This can be done by asking questions, providing an ever changing code, fingerprint, face scan, or hardware key.
Similar Resources on Wayground
10 questions
Technical Terms - Internet (A-Z) - Brute Force Attack

Quiz
•
12th Grade
9 questions
Ch 8.1 - System Hacking

Quiz
•
12th Grade
10 questions
Cybersecurity Quiz for Tech Integrators

Quiz
•
12th Grade
10 questions
Understanding Cybersecurity

Quiz
•
5th Grade - Professio...
10 questions
Post Assessment - Cybersecurity Awareness

Quiz
•
9th Grade - Professio...
7 questions
L3 - Script Kiddies

Quiz
•
9th - 12th Grade
10 questions
4Q4: Accessing Modem

Quiz
•
10th Grade
10 questions
Network issues and communication/ Security issues Grade 10

Quiz
•
10th Grade
Popular Resources on Wayground
50 questions
Trivia 7/25

Quiz
•
12th Grade
11 questions
Standard Response Protocol

Quiz
•
6th - 8th Grade
11 questions
Negative Exponents

Quiz
•
7th - 8th Grade
12 questions
Exponent Expressions

Quiz
•
6th Grade
4 questions
Exit Ticket 7/29

Quiz
•
8th Grade
20 questions
Subject-Verb Agreement

Quiz
•
9th Grade
20 questions
One Step Equations All Operations

Quiz
•
6th - 7th Grade
18 questions
"A Quilt of a Country"

Quiz
•
9th Grade
Discover more resources for Computers
50 questions
Trivia 7/25

Quiz
•
12th Grade
20 questions
Subject-Verb Agreement

Quiz
•
9th Grade
18 questions
"A Quilt of a Country"

Quiz
•
9th Grade
6 questions
RL.10.1 Cite Evidence

Quiz
•
10th Grade
10 questions
Characteristics of Life

Quiz
•
9th - 10th Grade
14 questions
Algebra 1 SOL Review #1

Quiz
•
9th Grade