1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nezavi [6.7K]
4 years ago
13

Your network employs basic authentication that centers on usernames and passwords. However, you have two ongoing problems. The f

irst is that usernames and passwords are frequently lost by negligent users. In addition, adversaries have, on occasion, fooled employees into giving up their authentication information via social engineering attacks. Discuss at least two things could you do to strengthen the use of basic username and password authentication, as discussed in the course textbook.
Computers and Technology
1 answer:
Agata [3.3K]4 years ago
8 0

Answer:

Using a one time password OTP and using a three factor authentication.

Explanation:

Social engineering is a form system and network attack, drafted by an attacker, to steal user credentials needed for accessing their accounts, to steal information.

Social engineering attacks like phishing, spear phishing, baiting and quid quo pro are used to fool users to giving out their user details.

One time password is an implied use of a password just once and a new password his generated to boost security. In a three factor authentication, OTP can be used as well as biometrics of a user which can not be giving away by a user to an attacker.

You might be interested in
Narrate an incident from the experience of a 14 year old girl which brings out the message: " Never leave till tomorrow what you
pogonyaev
Smth called google turbo record United in
7 0
3 years ago
The rhythmic note that three beats is called a____half note.
aev [14]

Answer:

it is called a dotted half note

7 0
3 years ago
Read 2 more answers
Write an expression that evaluates to true if the value of the string variable s1 is greater than the value of string variable s
Oksanka [162]
It is not entirely clear what this question means. I am going to assume that 'value' of a string refers to a numerical value, i.e. the strings represent numbers. The question also does not mention the programming language to use. There is a function in Delphi:

function isGreater(number1, number2: string): boolean;
begin
     Return StrToFloat(number1)>StrToFloat(number2);
end;


6 0
3 years ago
What can Strings store
horsena [70]
A string is generally considered as a data type and is often implemented as an array data structure of bytes (or words) that stores a sequence of elements, typically characters, using some character encoding. String may also denote more general arrays or other sequence (or list) data types and structures.
5 0
4 years ago
Read 2 more answers
How many months have 28 days?
Reika [66]

Answer:

All months of the year have at least 28 days, while February is the only month that is comprised of only 28 days (except for leap years)

5 0
3 years ago
Other questions:
  • based on the transcript, what did broadcasting the story through the medium of radio allow welles to do?
    8·1 answer
  • How many inputs are included in the following requirement? REQUIREMENT: Write a program that asks the employee for their age. Th
    6·1 answer
  • Which of the following would allow for more data to be stored on a CD?
    11·2 answers
  • The Freemont Automobile Factory has discovered that the longer a worker has been on the job, the more parts the worker can produ
    11·1 answer
  • What technical elements can a film director manipulate to achieve the final product, conveying his ideology and vision?
    11·1 answer
  • As a rising photographer who has recently been recognized for several impactful images, why might you explore copyright protecti
    13·1 answer
  • Phoebe has to give a permission about recycling. Where should she look while presenting?
    11·1 answer
  • Type the correct answer in the box.
    15·1 answer
  • If you have four documents open and click the x button on the title bar, _____.
    8·1 answer
  • What risks were involved?
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!