You have recently been hired as a security analyst. You have been given a copy of all organizational security policies. One of the policies stipulates that users will be issued login credentials that include a user name and password. The password will be the same for each login. Which type of password is being used?

A. Static password
B. One-time password
C. Complex password
D. Cognitive password


A
Explanation: A static password is the same for each login.
A one-time password (OTP) is used only once to log in to the access control system. A complex password includes a mixture of uppercase and lowercase letters, numbers, and special characters. A cognitive password is a piece of information that can be used to verify an individual's identity by answering questions.

Computer Science & Information Technology

You might also like to view...

Which of the following statements is false?

a. In the UML, each class is modeled in a class diagram as a rectangle with three compartments. The top one contains the class’s name centered horizontally in boldface. The middle one contains the class’s attributes, which correspond to instance variables in Java. The bottom one contains the class’s operations, which correspond to methods and constructors in Java. b. UML represents instance variables as an attribute name, followed by a colon and the type. c. Private attributes are preceded by the keyword private in the UML. d. The UML models operations by listing the operation name followed by a set of parentheses. A plus sign (+) in front of the operation name indicates that the operation is a public.

Computer Science & Information Technology

Which could be used for permanent storage of files?

A) ROM B) Hard Disk C) EPROM D) RAM

Computer Science & Information Technology

According to market research firm comScore, Pinterest users spend an average of ________ minutes per month on the site

A) 96 B) 89 C) 104 D) 127

Computer Science & Information Technology

By restricting access to the tables in Datasheet view, the integrity of the data and structure of the data is not at risk

Indicate whether the statement is true or false

Computer Science & Information Technology