Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

14- Creaking a password by searching a database for a value that corresponds to

ID: 3721773 • Letter: 1

Question

14- Creaking a password by searching a database for a value that corresponds to a known cryptographically transformed version the password is BEST describes as which of the following? A) Hybrid technique B) Brute force decryption C) Searching dictionary entires D) Using a rainbow table 15- A malicious insider was able to recover a Company's password file. The insider used a tool to recover employee' password and was able to recover 90% of the passwords in the first five minutes, which of the following will BEST mitigate this attack in the future? A) Failed logon monitoring B) Password length C) Account lockout D) Password history 16- An administrator places a server in "Permissive" mode to monitor security events before increasing systenm security. Which of the following tools is the administrator using? A) SELinux B) Containers C) Iptables D) Trusted Solaris 17- A consultant designing a new Company portal that will allow employees to authenticate, uploads, and share documents with other users using social media authentication. Which of the following should the consultant implement on the system? A) DAC B) SSH C) SCP D) SSO 18- each user in the factory has a dedicated PC that cannot be accessed remotely. Traditionally, these users only had network usernames and passwords. However, as the company is adopting a BYOD policy, the security administrator has decided to take advantage of these devices to add additional factors of user authentication with these goals. Users must not access their PCs remotely Users must have at least three factors of authentication to access their PCs. Users must utilize their BYOD to assist in authentication. Which of the following should the security administrator enforce to meet these goals (select TWO answers A) Give each user a PIN that can be entered into the corporate app on the BYOD B) Require a soft token app on the BYOD that changes token numbers every minute. C) Require the BYOD to be registered with the corporate application and have GPS on D) Ensure each BYOD's lock screen has a picture the user wearing his or her ID E) Ensure users are logged into BYOD's prior to logging onto their factory PC's F) Require that each BYOD is locked and plugged into the PC to change prior to login.

Explanation / Answer

Solution:

14)

B

15)

Account lockout

16)

SELinux

17)

SSH

18)

D

I hope this helps if you find any problem. Please comment below. Don't forget to give a thumbs up if you liked it. :)

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at drjack9650@gmail.com
Chat Now And Get Quote