Ask your own question, for FREE!
Computer Science 13 Online
OpenStudy (dqswag):

1. Which of the following is the most effective password? (Points : 2) bankaccount1 M3r(urY xK6D(#dsswuJD merc_ury

OpenStudy (dqswag):

hello

OpenStudy (anonymous):

Hello, Calculate the entropy of each password, will allow finding the most effective password. 1. xK6D(#dsswuJD = 65.6 bits of entropy. 2. bankaccount1 = 46.9 bits of entropy. 3. M3r(urY = 32.4 bits of entropy. 4. merc_ury = 32.3 bits of entropy. Note: I did not take into account dictionary attacking. Other wise number 2 would actually be ranked lower. Peace.

OpenStudy (dqswag):

@Algorithmic so u would go with B. Why im mean like why not 1 or A... ??

OpenStudy (anonymous):

I would go with the one I ranked as number one, due to it having higher entropy. So C. I would not A, bankaccount1, because it have less entropy, as well as more likely to fall to dictionary attacks.

OpenStudy (dqswag):

ok

OpenStudy (dqswag):

@alg i have 1 more

OpenStudy (dqswag):

@Algorithmic 1 more

OpenStudy (anonymous):

Okay.

OpenStudy (dqswag):

3. Which of these image sizes takes the most storage space? (Points : 2) one megabyte one gigabyte one kilobyte

OpenStudy (dqswag):

@Algorithmic

OpenStudy (dqswag):

ok here is to my own answers

OpenStudy (dqswag):

1. Which of the following is the most effective password? (Points : 2) bankaccount1 M3r(urY xK6D(#dsswuJD merc_ury Question 2. 2. Which of the following describes the phishing method of information security crime? (Points : 2) physically interacting with the victim and using her computer when she is not looking rifling through recycling bins to find account information pretending to be someone else when asking for information all of these Question 3. 3. Which of these image sizes takes the most storage space? (Points : 2) one megabyte one gigabyte one kilobyte Question 4. 4. Which of these is a valid use of the Reply All feature? (Points : 2) correcting someone's spelling mistake in an e-mail responding with "I agree" or "me too" responding with "please take me off your list" none of these Question 5. 5. A plain text e-mail and the same text entered into a word processing document would be about the same file sizes. (Points : 2) True False Question 6. 6. Phishing sites do not try steal your personal information. (Points : 2) True False Question 7. 7. Disabling cookies prevents you from being the victim of a virus. (Points : 2) True False Question 8. 8. Removing a virus from your system is easily done with a reboot. (Points : 2) True False Question 9. 9. A firewall, when properly implemented, can prevent most attacks on your system. (Points : 2) True False Question 10. 10. The Blind carbon copy (Bcc) should be used when you want to __________. (Points : 2) share a conversation you are having with someone else with your boss give someone advice without that person realizing other people are seeing it send the same message out to a group of people but want to prevent a global reply

OpenStudy (dqswag):

1.C 2.D 3.C 4.A 5.A 6.B 7.B 8. This one is a 50% chance so I say A. 9.A. 10.A. I got a 40!! helppp

Can't find your answer? Make a FREE account and ask your own questions, OR help others and earn volunteer hours!

Join our real-time social learning platform and learn together with your friends!
Can't find your answer? Make a FREE account and ask your own questions, OR help others and earn volunteer hours!

Join our real-time social learning platform and learn together with your friends!