Get premium membership and access questions with answers, video lessons as well as revision papers.
This method uses secret data e.g. strings of character to control access to a system and is normally used together with usernames. The passwords are either created by the user or assigned by system administrators. Usually, limitations to password creation include length restrictions, a requirement of number characters, uppercase letters or special characters. The system may also force a user to change their passwords after a given amount of time.
Kavungya answered the question on May 17, 2019 at 09:48
- Define Dumpster Diving.(Solved)
Define Dumpster Diving.
Date posted: May 17, 2019. Answers (1)
- What is Wiretapping?(Solved)
What is Wiretapping?
Date posted: May 17, 2019. Answers (1)
- What is Eavesdropping on Emanations?(Solved)
What is Eavesdropping on Emanations?
Date posted: May 17, 2019. Answers (1)
- Describe Denial or Degradation of Service.(Solved)
Describe Denial or Degradation of Service.
Date posted: May 17, 2019. Answers (1)
- Define Masquerading.(Solved)
Define Masquerading.
Date posted: May 17, 2019. Answers (1)
- Define software piracy.(Solved)
Define software piracy.
Date posted: May 17, 2019. Answers (1)
- What is Traffic Analysis?(Solved)
What is Traffic Analysis?
Date posted: May 17, 2019. Answers (1)
- Describe Trap Doors.(Solved)
Describe Trap Doors.
Date posted: May 17, 2019. Answers (1)
- Define Botnets.(Solved)
Define Botnets.
Date posted: May 17, 2019. Answers (1)
- Define a Ransomware.(Solved)
Define a Ransomware.
Date posted: May 17, 2019. Answers (1)
- Define Salamis.(Solved)
Define Salamis.
Date posted: May 17, 2019. Answers (1)
- Describe Logic Bombs.(Solved)
Describe Logic Bombs.
Date posted: May 17, 2019. Answers (1)
- What is Data Diddling?(Solved)
What is Data Diddling?
Date posted: May 17, 2019. Answers (1)
- Define IP Spoofing.(Solved)
Define IP Spoofing.
Date posted: May 17, 2019. Answers (1)
- Describe Password Sniffing.(Solved)
Describe Password Sniffing.
Date posted: May 17, 2019. Answers (1)
- Define Rootkits.(Solved)
Define Rootkits.
Date posted: May 17, 2019. Answers (1)
- Define Keyloggers.(Solved)
Define Keyloggers.
Date posted: May 17, 2019. Answers (1)
- Excess Privileges.(Solved)
Excess Privileges.
Date posted: May 17, 2019. Answers (1)
- Define a Zero Day Attack.(Solved)
Define a Zero Day Attack.
Date posted: May 17, 2019. Answers (1)
- Describe social engineering.(Solved)
Describe social engineering.
Date posted: May 17, 2019. Answers (1)