The Full Wiki

More info on Password strength

Password strength: Quiz

  

Question 1: [8] Currently, distributed.net estimates that cracking a 72-bit key using current hardware will take about 403,784.9 ________ or 1,105.5 years.
Islamic calendarDayCalendarGregorian calendar

Question 2: mnemonic passwords: Some users develop ________ phrases and use them to generate high-entropy (more or less random) passwords which are nevertheless relatively easy for the user to remember.
Eidetic memoryEmotion and memoryMnemonicMemory

Question 3: The reason this is so is due to deep and fundamental problems with identifying ________.
Hardware random number generatorProbabilityRandomnessInformation theory

Question 4: [7] The hashes widely used for storing passwords, such as ________ and the SHA family, are designed for efficient implementation in hardware.
MD2 (cryptography)Cryptographic hash functionSHA hash functionsMD5

Question 5: [10][citation needed] Whether or not ________ will be able to do so in practice is still unknown, though theoretical analysis suggests such possibilities.
Quantum algorithmQubitBQPQuantum computer

Question 6: An expert from ________ was quoted as saying, at a 2005 security conference: "I claim that password policy should say you should write down your password.
Internet ExplorerMicrosoftMicrosoft WindowsMicrosoft Office

Question 7: Password strength is a measure of the effectiveness of a ________ in resisting guessing and brute-force attacks.
PasswordPassword crackingAuthenticationCryptography

Question 8: Many hand held devices, such as ________ and smart phones, require complex shift sequences to enter special characters.
Mobile deviceSmartphonePersonal digital assistantPalm OS

Question 9: The symbols can be individual characters from a character set (eg, the ________ character set), syllables designed to form pronounceable passwords, or even words from a word list (thus forming a passphrase).
ISO/IEC 8859-1Code page 437Windows-1252ASCII

Question 10: Using strong passwords lowers overall ________ of a security breach, but strong passwords do not replace the need for other effective security controls.
Risk managementUncertaintyFinancial riskRisk
















Got something to say? Make a comment.
Your name
Your email address
Message