1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nezavi [6.7K]
3 years ago
13

Your network employs basic authentication that centers on usernames and passwords. However, you have two ongoing problems. The f

irst is that usernames and passwords are frequently lost by negligent users. In addition, adversaries have, on occasion, fooled employees into giving up their authentication information via social engineering attacks. Discuss at least two things could you do to strengthen the use of basic username and password authentication, as discussed in the course textbook.
Computers and Technology
1 answer:
Agata [3.3K]3 years ago
8 0

Answer:

Using a one time password OTP and using a three factor authentication.

Explanation:

Social engineering is a form system and network attack, drafted by an attacker, to steal user credentials needed for accessing their accounts, to steal information.

Social engineering attacks like phishing, spear phishing, baiting and quid quo pro are used to fool users to giving out their user details.

One time password is an implied use of a password just once and a new password his generated to boost security. In a three factor authentication, OTP can be used as well as biometrics of a user which can not be giving away by a user to an attacker.

You might be interested in
20<br>Calculate the kinette energy of a body the speed<br>that will be a mass tragm​
jolli1 [7]

Answer:

20

Explanation:

4 0
3 years ago
Mhairi believes that if a site’s information is detailed enough, it is more likely to be true. Is she correct? Answers
inysia [295]
In my opinion, I would say No. So I think the answer is C.
6 0
3 years ago
Read 2 more answers
When encoding information, which of the five senses has been shown to be more durable and last longer in memory?
Llana [10]
<span>Olfactory memory tends to be the most durable. Surprisingly, smells tend to be the most strongly related with memories. This has been shown by people being able to associate smells with events for longer periods than any other sensory input. Most other inputs only stay in memory for a period of milliseconds, up to 2-4 seconds at the most.</span>
8 0
3 years ago
_____ is an example of a Google filetype operator.​
shtirl [24]

Answer:

d. all of the above

Explanation:

Google filetype operator enables restricting the search results to the specified file type. For example if you are searching for Eiffel Tower and you want to restrict the results to pdf files then the query will be of the form Eiffel Tower filetype:pdf . Similarly for text file results you need to specify the search query as Eiffel Tower filetype:text. The Google filetype operator supports several different file types.

3 0
3 years ago
When spark plug cables aren't far enough apart, premature firing of adjacent spark plugs can happen. this is known as?
e-lub [12.9K]
Misfiring seems to be a blanket term for spark plug inefficiencies and errors due to wrong gap configuration. Because of the small gap, the time <span>of the spark has less travel distance, it does not remain hot enough to ignite the air-fuel mixture that is needed to run the engine. </span>
7 0
3 years ago
Other questions:
  • Information management examines the organizational resource of information and regulates its definitions, uses, value, and distr
    11·1 answer
  • Write a statement that reads 5 successive integers into these variables that have already been declared : x1 x2x3x4 x5. Then wri
    7·1 answer
  • The central processing unit​ (cpu) works in conjunction with​ ________ to perform processing.
    5·1 answer
  • You have repaired a broken LCD panel in a laptop computer. However, when you disabled the laptop, you bent the hinge on the lid
    15·1 answer
  • What is IaaS? For this service model, what are the resources the cloud vendor will provide/manage and what are the resources the
    15·1 answer
  • A(n) _____________ is a system that prevents a specific type of information from moving between untrusted networks and private n
    9·1 answer
  • The limit for characters in modern file systems is too small to accommodate keywords in titles
    7·2 answers
  • <img src="https://tex.z-dn.net/?f=6.372%20%5Ctimes%2075%20find%20the%20product" id="TexFormula1" title="6.372 \times 75 find the
    6·1 answer
  • How do you loop a makebeat in earsketch
    11·1 answer
  • Python Coding:
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!