Password Settings + Hard and Soft Tokens

0.0(0)
studied byStudied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/6

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 5:15 PM on 1/22/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

7 Terms

1
New cards

Length

which has typically been one of the best controls to prevent passwords brute forcing

2
New cards

Complexity

which influences password attacks by ensuring that larger character sets are required for brute-force attacks and in many implementations, also prevents the use of common words or a series of repeated characters

3
New cards

Reuse limitations

are set to ensure that users don’t simply set their password to a previous password, which may have been exposed, reused, or compromised

4
New cards

Expiration dates

Are set to ensure that passwords are not used for extended periods of time. Expiration dates often create additional support work for help desks, which means many organizations have moved to not requiring password changes as frequently — or ever — if they have multifactor authentication (MFA) in place

5
New cards

Age settings

for passwords are used to ensure that users do not simply reset their passwords over and over until they bypass reuse limitations, allowing them to return to their former password

6
New cards

A USB security key is an example of

a hard, or physical, token

7
New cards

An application is an example of

a soft token