A+ Guide to IT Technical Support (Hardware and Software) (MindTap Course List)
9th Edition
ISBN: 9781305266438
Author: Jean Andrews
Publisher: Cengage Learning
expand_more
expand_more
format_list_bulleted
Concept explainers
Expert Solution & Answer
Chapter 18, Problem 4RTB
Explanation of Solution
Given:
A password for a system is PINE963$&apple, which is not a strong password.
To find:Â The reason why PINE963$&apple cannot be treated as a strong password.
Solution:
PINE963$&apple is not a strong password because this password contains words that can be easily guessed by an attacker.
A strong password contains at least 16 characters.
The password should not contain words that can be found in a dictionary. The password: PINE963$&apple, has two dictionary words PINE and apple.
A strong password contains a combination of uppercases and lowercases letters, numbers, and symbols.
A strong password does not use adjacent keys present on the keyboard.
Want to see more full solutions like this?
Subscribe now to access step-by-step solutions to millions of textbook problems written by subject matter experts!
Students have asked these similar questions
Chelsea is a hacker who befriends Adele McCain over lunch at the cafeteria. Adele is the senior associate of Spandangle Ltd., a private law firm based in Alabama. Chelsea manages to successfully guess Adele's password to a sensitive database in the law firm. What kind of password attack did she use?
Q2: Explain the suitability or unsuitability of the following passwords:
Qwerty
Einstein
wysiwyg (for “what you see is what you get”)
drowssap
KVK 919
Florida
*laptop_admin#
cr@zyp@ss
1.List any two differences between symmetric and asymmetric encryption.
2.You should never use public Wi-Fi without using a ____________.
3.
3.File hashing addresses which security concern?
Confidentiality
Authentication
Encryption
Integrity
Chapter 18 Solutions
A+ Guide to IT Technical Support (Hardware and Software) (MindTap Course List)
Knowledge Booster
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.Similar questions
- Provide justifications for the appropriateness or inappropriateness of the following suggested passwords: TV9 stove • George Washington • Aristotle • F.arrow_forwardDescribe how a fake login management problem might be fixed in this essay. Make a list of all the different authentication techniques you can think of. Do you think passwords will become obsolete in the near future?arrow_forwardWhat are two password management applications, one of which is a stand-alone application and another of which is a browser-based application? Compare their features.arrow_forward
- Describe a bogus login management situation. Authentication techniques vary. Passwords waning?arrow_forwardwhat is the difference between authentication and authorization? Can a system permit autorization without authentication? why or why not? 1 page 12pt double spaced pleasearrow_forwardDiscuss the benefits and drawbacks of Windows BitLocker encryption for data security.arrow_forward
- Explain the suitability or unsuitability of the following passwords: • a. YK 334 • b. mfmitm (for “my favorite movie is tender mercies) • c. Natalie1 • d. Washington • e. Aristotle • f. tv9stove • g. 12345678 • h. dribgibarrow_forward1.Which of the following is a type of malware that is designed to spread from one computer to another without any user interaction? Trojan Rootkit Worm Spyware 2.Which of the following cryptographic algorithms is classified as symmetric? Diffie-Hellman RSA AES ECC 3.What control provides the best protection against both SQL injection and cross-site scripting attacks? Hypervisors Network Layer Firewalls CSRF Input Validation 4.Tom would like to send an encrypted message to Jerry using asymmetric cryptography. What key should Tom use to encrypt the message? Jerry's public key Jerry's private key Tom's public key Tom's private keyarrow_forwardExplain the suitability or unsuitability of the following passwords: a. qwerty b. Einstein c. wysiwyg (for “what you see is d. drowssapwhat you get”) e. KVK 919 f. Florida g. *laptop_admin# h. cr@zyp@ssarrow_forward
- This is hypothetical authentication management. List your authentication methods. How do you feel about password security in the future?arrow_forwardInvent a situation requiring the handling of logins and describe it. Make a list of all the many ways you've established your identity. What are your ideas on how passwords will evolve in the future?arrow_forwardCan you please elaborate on why each of the following passwords is/is not a good one to use? • a TV9 stove • d. Washington • e. Aristotle • f.arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- A+ Guide To It Technical SupportComputer ScienceISBN:9780357108291Author:ANDREWS, Jean.Publisher:Cengage,
A+ Guide To It Technical Support
Computer Science
ISBN:9780357108291
Author:ANDREWS, Jean.
Publisher:Cengage,