Activity 2.1.3 Password Strength -- Strong!

Quiz
•
Computers
•
9th - 12th Grade
•
Hard
Andrew Griffin
Used 4+ times
FREE Resource
7 questions
Show all answers
1.
FILL IN THE BLANK QUESTION
1 min • 1 pt
The person in this role is responsible for managing computers, networks, servers, an other computing resources. They are also the person that implements security policies for an organization. What is this IT role?
2.
FILL IN THE BLANK QUESTION
1 min • 1 pt
What is the first line of defense in protecting personally identifiable information (PII)? It is often much weaker than necessary.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Password files can be stolen from an organization and attacked on a device by trying thousands of combinations. This method of attack is the reason that we should not rely on the security of an organizations network. What is the attack method?
Offline brute force
Brute force
Frequency Analysis
Rainbow Tables
4.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
When developing a password or passphrase what should be included to make it as strong as possible?
Uppercase letters
Symbols
Spaces (if accepted)
Numbers
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A random string of characters using uppercase, lowercase, symbols and numbers is a much stronger password than a meaningful passphrase.
True
False
Answer explanation
You may have heard that random letters, numbers, and symbols such as Gp3fC0#2nP make a good password. It is certainly better than qwerty or password, but a passphrase is still much better. A handful of normal words, randomly associated but meaningful to you make for a good passphrase; perhaps looking around your classroom, something like blue backpack and green chairs is meaningful to you. According to the National Institute of Standards and Technology (NIST), with so many characters, it would take about 1,050,000 times more effort to crack this passphrase than the ten-character password, even without numbers and symbols. With a bit of tweaking, the passphrase my1bluebackpack&6greenchairs makes for an excellent passphrase.
6.
FILL IN THE BLANK QUESTION
1 min • 1 pt
What term matches the following definition?
To give permission, for example, to access information.
7.
FILL IN THE BLANK QUESTION
1 min • 1 pt
What method of computer access control only grants user access after presenting several separate pieces of evidence? This can be done by asking questions, providing an ever changing code, fingerprint, face scan, or hardware key.
Similar Resources on Wayground
10 questions
Computer Lab Rules

Quiz
•
5th - 11th Grade
10 questions
4.4 Prevention methods

Quiz
•
9th - 11th Grade
11 questions
R12 Digital Forensics

Quiz
•
9th - 12th Grade
10 questions
Email Quiz - PWHS

Quiz
•
1st - 12th Grade
10 questions
Menginstalasi sumber daya berbagi pakai

Quiz
•
10th Grade
12 questions
Kuis Informatika XI

Quiz
•
12th Grade
7 questions
Network Threat Specs

Quiz
•
9th - 10th Grade
10 questions
Cybersecurity Best Practices and Awareness Quiz

Quiz
•
12th Grade
Popular Resources on Wayground
10 questions
Video Games

Quiz
•
6th - 12th Grade
20 questions
Brand Labels

Quiz
•
5th - 12th Grade
15 questions
Core 4 of Customer Service - Student Edition

Quiz
•
6th - 8th Grade
15 questions
What is Bullying?- Bullying Lesson Series 6-12

Lesson
•
11th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
15 questions
Subtracting Integers

Quiz
•
7th Grade
22 questions
Adding Integers

Quiz
•
6th Grade
10 questions
Exploring Digital Citizenship Essentials

Interactive video
•
6th - 10th Grade
Discover more resources for Computers
10 questions
Exploring Digital Citizenship Essentials

Interactive video
•
6th - 10th Grade
10 questions
Proper Keyboarding Techniques

Interactive video
•
6th - 10th Grade
14 questions
Inputs and Outputs: Computer Science Intro

Lesson
•
5th - 9th Grade
10 questions
Understanding Computers: Hardware, Software, and Operating Systems

Interactive video
•
7th - 12th Grade
29 questions
AP CSP Unit 2 Review (Code.org)

Quiz
•
10th - 12th Grade