Before you run a password cracking program on your company’s computers to check for weak passwords, what should you do?

A. Get permission from management
B. Disable all accounts
C. Change all passwords
D. Tell all employees


A. Get permission from management

Computer Science & Information Technology

You might also like to view...

Which constants are used to indicate that a ResultSet is scrollable, insensitive to changes and read only?

a. TYPE_SCROLLABLE_INSENSITIVE, CONCUR_READ_ONLY. b. TYPE_SCROLLABLEINSENSITIVE, CONCUR_READONLY. c. TYPE_SCROLL_INSENSITIVE, CONCUR_READ_ONLY. d. TYPE_SCROLL_INSENSITIVE, CONCUR_READONLY.

Computer Science & Information Technology

A ____ is a collection of graphically displayed choices and commands related to a specific tool or feature.

a. patch b. group c. sector d. panel

Computer Science & Information Technology

NTFS is the primary file system that has been included with Windows since the advent of Windows 2000

Indicate whether the statement is true or false.

Computer Science & Information Technology

With Bluetooth printing, the computer and printer need to be aligned with each other. 

Answer the following statement true (T) or false (F)

Computer Science & Information Technology