You have been tasked with training end users in security best practices and have observed a trend among users in which many are writing down their passwords.
 
Which of the following procedures can be implemented to provide enough security to protect resources while minimizing the need for users to write down their passwords?

A. Disable password complexity requirement.
B. Disable required passwords.
C. Lengthen the time period between forced password changes.
D. Increase password length requirement.


Answer: C

Computer Science & Information Technology

You might also like to view...

From the windows 8 start screen you can choose which apps to run using a ________

A. touch screen B. mouse C. printer D. storage device

Computer Science & Information Technology

The Excel command that enables you to specify rows and columns to repeat on each printedpage is:

a. navigate b. print titles c. conditional format

Computer Science & Information Technology

Information that is removed by the Document Inspector cannot be recovered with the Undo command

Indicate whether the statement is true or false

Computer Science & Information Technology

On a worksheet, if numbers appear as the column headings, then the reference style for Excel is A1

Indicate whether the statement is true or false

Computer Science & Information Technology