A __________ strategy is one in which the system periodically runs its own password cracker to find guessable passwords.

A. user education B. proactive password checking

C. reactive password checking D. computer-generated password


C. reactive password checking

Computer Science & Information Technology

You might also like to view...

If a system has an average power level of 100, an average noise level of 33.33, and a bandwidth of 100 MHz, what is the effective limit on channel capacity?

What will be an ideal response?

Computer Science & Information Technology

Which of the following should NOT be done if Access give you a security warning about your database?

A) Run a virus scan on any file before you say it should be trusted. B) If you know the database is safe, you can trust a database permanently by storing it in a trusted location. C) Do not click Enable Content in the security warning if you are not sure if the database is safe. D) Enable the content. Nothing bad will happen, even if there is a virus embedded in the file.

Computer Science & Information Technology

________ rules place restrictions on the types of data that can be entered into cells

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

What is a systems requirement, and how are systems requirements classified?

What will be an ideal response?

Computer Science & Information Technology