1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nezavi [6.7K]
3 years ago
13

Your network employs basic authentication that centers on usernames and passwords. However, you have two ongoing problems. The f

irst is that usernames and passwords are frequently lost by negligent users. In addition, adversaries have, on occasion, fooled employees into giving up their authentication information via social engineering attacks. Discuss at least two things could you do to strengthen the use of basic username and password authentication, as discussed in the course textbook.
Computers and Technology
1 answer:
Agata [3.3K]3 years ago
8 0

Answer:

Using a one time password OTP and using a three factor authentication.

Explanation:

Social engineering is a form system and network attack, drafted by an attacker, to steal user credentials needed for accessing their accounts, to steal information.

Social engineering attacks like phishing, spear phishing, baiting and quid quo pro are used to fool users to giving out their user details.

One time password is an implied use of a password just once and a new password his generated to boost security. In a three factor authentication, OTP can be used as well as biometrics of a user which can not be giving away by a user to an attacker.

You might be interested in
Which of the following Python methods in scipy.stats submodule returns the P-value for performing a hypothesis test for the sign
ipn [44]

Answer:

Option B is the correct answer for the following question.

Explanation:

The following option is true because the pearsonr from scipy module is the method of the Python Programming Language in the submodule i.e., "scipy.stats" which print or return P-value for operating the hypothesis test for the value of correlation coefficient. So, that's why the following option is correct.

7 0
3 years ago
A retail store stocks two types of shirts A and B. These are packed in attractive cardboard boxes. During a week the store can s
antiseptic1488 [7]
300 of A and 300 of b
7 0
2 years ago
I really need help with this question! Please help!
Pachacha [2.7K]

Explanation:

the third answer is correct

4 0
2 years ago
Read 2 more answers
you have a website that customers use to view product information and place orders. You would like to identify the maximum numbe
notka56 [123]

Answer:

a load tester.

Explanation:

Based on the information provided within the question it can be said that in this situation the tool that you should use is known as a load tester. This tool allows you to test your servers in order to see how it behaves under both normal conditions as well as the anticipated peak load conditions that it may be encountering in the near future. Which is exactly what you need for your website.

4 0
3 years ago
Busca información (nombre, potencia y situación) de los parques eólicos de la Comunidad Valenciana. con más de 40 MW de potencia
Colt1911 [192]
I need this answer too can someone please help us out with the right answer ?!

Explanation:
6 0
2 years ago
Other questions:
  • The ease of travel in the twentieth century played a role in the advancement of medicine. Based on this lesson, which statement
    5·2 answers
  • List and describe three options in the autocad object snap toolbar
    8·1 answer
  • Each cout statement has a syntax error. Type the first cout statement, and press Run to observe the error message. Fix the error
    11·1 answer
  • Which is a good guideline to follow when choosing a background for your slides?. . A. Use a different background for each slide.
    8·1 answer
  • [20 pts] Write the function rectangle(perimeter, area), which takes two positive integers, perimeter and area. It returns an int
    11·1 answer
  • Jeremy wishes to create a site map for his website. What tag will surround the URL of his home page?
    9·1 answer
  • You want to look up colleges but exclude private schools. Including punctuation, what would you
    9·2 answers
  • Which of these would NOT be a valid Internet Control Message Protocol (ICMP) error message:
    6·1 answer
  • What are minimum computer requirements for a software program?
    5·1 answer
  • few toffees were distributed among oriya , piyush and payal . priya got 3/8 , piyush and payal 1/8 and 1/2 of total toffees resp
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!