ITE 249 Two Rights & A Wrong

Ace your homework & exams now with Quizwiz!

a. Two popular key stretching password hash algorithms are bcrypt and PBKDF2. b. A salt is a random string that is used in hash algorithms. c. A complex password (xi8s7$t#6%) is more secure than a long password (thisisalongpassword).

C. A complex password (xi8s7$t#6%) is more secure than a long password (thisisalongpassword).

a. Any shared account (an account used by more than one user), generic account (an account not tied to a specific person), or guest account (given to temporary users) should be prohibited. b. An access control scheme is embedded in the software and hardware. c. A data privacy officer (DPO) is someone to whom day-to-day actions have been assigned by the owner.

C. A data privacy officer (DPO) is someone to whom day-to-day actions have been assigned by the owner.

a. SOAR platforms have different pre-configured playbooks that are based on industry best practices and recognized standards. b. When an incident occurs, isolation is then used to segregate both the attacker and the infected systems from reaching other devices. c. A runbook is a linear style checklist of required steps and actions required to successfully respond to specific incident types and threats.

C. A runbook is a linear style checklist of required steps and actions required to successfully respond to specific incident types and threats.

a. Online brute force attacks are considered impractical. b. An HMAC-based one-time password (HOTP) password is "event driven." c. Password crackers differ as to when candidate digests are created.

C. Password crackers differ as to when candidate digests are created.

a. A DNS service is the most important network-based device log to examine. b. A multi-platform log management tool that supports various platforms, log sources, and formats is nxlog. c. IPFIX (IP Flow Information Export) is similar to NetFlow but with additional capabilities, such as integrating Simple Network Management Protocol (SNMP) information directly into the IPFIX information.

a. A DNS service is the most important network-based device log to examine.


Related study sets

Week 8 Smartbook: Immune System & Body Defense

View Set

Human Relations - Chapter 1 and 3 (Psychology)

View Set

HLTH 1100 chapter 1, HLTH 1100 chapter 2, HLTH 1100 chapter 3, HLTH 1100 chapter 4

View Set