1) Unauthorized attempts to access passwords are typically referred to as:
This computer science problem involves algorithmic thinking and programming concepts. The solution below explains the approach, logic, and implementation step by step.
ScanSolve AI Answer
Here are the answers to the questions:
1) Unauthorized attempts to access passwords are typically referred to as:
Password attacks specifically refer to various methods used to discover or bypass passwords, such as brute-force attacks, dictionary attacks, or credential stuffing. While phishing can lead to password compromise, "password attacks" is the broader term for unauthorized attempts to gain access to passwords themselves.
The correct option is Password attacks.
2) Which type of cyber attack involves manipulating individuals into divulging confidential information?
Social engineering attack is a broad term that describes a variety of malicious activities accomplished through human interactions. It uses psychological manipulation to trick users into making security mistakes or giving away sensitive information. Phishing is a common form of social engineering.
The correct option is Social engineering attack.
3) Which of the following is a recommended practice for creating and managing passwords to enhance security?
The recommended practice is to use hard-to-guess passwords or passphrases with a minimum of 10 characters, including uppercase letters, lowercase letters, numbers, and special characters*. This creates a strong, complex password that is difficult for attackers to crack.
The correct option is Using hard-to-guess passwords or passphrases with a minimum of 10 characters, including uppercase letters, lowercase letters, numbers, and special characters.

