Question 1: [8] Currently, distributed.net estimates that cracking a 72-bit key using current hardware will take about 403,784.9 ________ or 1,105.5 years. | |||
|
Question 2: mnemonic passwords: Some users develop ________ phrases and use them to generate high-entropy (more or less random) passwords which are nevertheless relatively easy for the user to remember. | |||
|
Question 3: The reason this is so is due to deep and fundamental problems with identifying ________. | |||
|
Question 4: [7] The hashes widely used for storing passwords, such as ________ and the SHA family, are designed for efficient implementation in hardware. | |||
|
Question 5: [10][citation needed] Whether or not ________ will be able to do so in practice is still unknown, though theoretical analysis suggests such possibilities. | |||
|
Question 6: An expert from ________ was quoted as saying, at a 2005 security conference: "I claim that password policy should say you should write down your password. | |||
|
Question 7: Password strength is a measure of the effectiveness of a ________ in resisting guessing and brute-force attacks. | |||
|
Question 8: Many hand held devices, such as ________ and smart phones, require complex shift sequences to enter special characters. | |||
|
Question 9: The symbols can be individual characters from a character set (eg, the ________ character set), syllables designed to form pronounceable passwords, or even words from a word list (thus forming a passphrase). | |||
|
Question 10: Using strong passwords lowers overall ________ of a security breach, but strong passwords do not replace the need for other effective security controls. | |||
|
|