Western Governors University (WGU) ACCT3360 D217 Accounting Information Systems Practice Exam

Session length

1 / 20

What is an example of contra-security behavior?

Using two-factor authentication

Sharing access codes orally

Writing passwords on a post-it note

The identification of writing passwords on a post-it note as an example of contra-security behavior is accurate because it directly undermines security protocols. This behavior involves storing sensitive information in an easily accessible and insecure format. A post-it note, often placed in plain sight, exposes the passwords to unauthorized individuals, increasing the risk of security breaches. Effective security practices emphasize keeping passwords confidential and secure; hence, writing them in a way that makes them easily discoverable is a significant lapse in security measures.

In contrast, two-factor authentication, sharing access codes orally, and regularly updating passwords represent best practices in maintaining security and protecting against unauthorized access. Two-factor authentication adds an extra layer of protection, sharing access codes orally can be risky but could occasionally involve more careful controls than a visible note, and updating passwords regularly helps prevent unauthorized access over time.

Regularly updating passwords

Next Question
Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy