13.8k views
2 votes
Which of the following enable unauthorized access to your network, and by extension, the sensitive documents, proprietary code, and accounting files stored on it? a. Weak passwords b. Guest accounts c. Organizational d. Units Forests

User Mantrid
by
3.9k points

2 Answers

6 votes

Answer:

Weak passwords

Step-by-step explanation:

  • Weak passwords enable unauthorized access to the network.
  • Hackers use password cracking software and methods such as the brute force method is one of the password cracking techniques.
  • These password cracking techniques are used to generate several possible passwords for a particular username which can result in unauthorized access to a system or network.
  • Weak passwords are easier to crack for the hackers.
  • Weak passwords include same password which is repeatedly used, using date of birth as password, short passwords, passwords that do not contain special symbols, password containing name of a person or common words like hello, abcd.
  • So due to weak passwords the hackers can access your accounts, your network when you do not change default password of your router and your system can be attacked to steal sensitive information stored on it.
User Pagurix
by
3.3k points
3 votes

Answer:

(a) Weak passwords

Step-by-step explanation:

Typically, a password is weak if it is easily discovered by all persons including unauthorized users. When passwords to a network are weak, the network is vulnerable to unauthorized access and may permit access to proprietary code, accounting files and other sensitive documents in the network.

Examples of weak passwords are;

i. those generated from the name of a user.

ii. those generated for a user by default.

iii. those generated from words from dictionary or other similar materials.

iv. those that don't include a combination of letters and numbers and even symbols.

v. those that are short in length e.g less than 8 characters.

User Meziane
by
3.9k points