Thursday, August 11, 2016

CyberSecurity: Two Factor Authentication - Quiz

1. Which one of the following is not considered good practice when managing passwords?
2. What is the term used to describe a type of attack where a computer works methodically through all possible passwords?

3. Which one of the following should always be avoided?
4. All but one of the following are examples of two-factor authentication. Which of these is the odd one out, because it does not involve two factors?
Which of the following statements about the OAuth (Open Authentication) mechanism is true?

2 comments: