Computers and Technology
Computers and Technology, 03.06.2020 14:02, MC2007

While reviewing system logs, a security analyst notices that a large number of end users are changing their passwords four times on the day the passwords are set to expire. The analyst suspects they are cycling their passwords to circumvent current password controls. Which of the following would provide a technical control to prevent this activity from occurring? A. Set password aging requirements.

B. Increase the password history from three to five

C. Create an AUP that prohibits password reuse.

D. Implement password complexity requirements

answer
Answers: 2

Other questions on the subject: Computers and Technology

image
Computers and Technology, 21.06.2019 21:30, khikhi1705
What elements related to the release and success of the nes console do you see in modern console releases? what elements are no longer relevant to modern console gaming?
Answers: 3
image
Computers and Technology, 22.06.2019 00:40, mcfancei
Reading characters and strings from the keyboard: consider the following c++ program 1. #include 2. #include 3. using namespace std; 4. mystring1 5. 6. int main() 7. { 8. 9. string mystring1, mystring2; mychar1 10. 11. 12. char mychar1, mychar2; 13. 14. cout< < "enter a string: "; mychar2 15. 16. cin> > mystring1; // 17. cin. get(mychar1); 18. cin> > mychar2; 19. getline(cin, mystring2); mystring2 20. 21. 22. cout<
Answers: 1
image
Computers and Technology, 22.06.2019 15:30, mikey3882
When creating a budget, log fixed expenses before income. after income. after savings. at the top.
Answers: 1
image
Computers and Technology, 23.06.2019 05:00, mariahchaparro08
Which best explains why a digital leader would join a society specializing in technology
Answers: 1
Do you know the correct answer?
While reviewing system logs, a security analyst notices that a large number of end users are changin...

Questions in other subjects:

Konu
Mathematics, 02.09.2021 05:10
Konu
Mathematics, 02.09.2021 05:10