CIMA Risk Management P3 Question # 84 Topic 9 Discussion

CIMA Risk Management P3 Question # 84 Topic 9 Discussion

P3 Exam Topic 9 Question 84 Discussion:
Question #: 84
Topic #: 9

Some sensitive computer systems are particularly attractive to cyber criminals. Passwords may be used as one element of restricting access to legitimate users, but the password systems should be designed with great care.

Which of the following methods would enhance a password access system?


A.

The use of a two level system, a primary password plus questions correctly answered from set of queries, logged at system set up time.


B.

The use of drop down menus, using screen coordinates rather than transmitting keystrokes over a communication link.


C.

The logging and reporting of failed password attempts.


D.

The password should be typed quickly.


E.

The use of family members names, known only to the individual and not known by colleagues.


F.

The use of a sequence of passwords, using upper and lower case with numbers, easy to remember but regularly changed for example; November 11, December12, January01.


Get Premium P3 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.