Roger’s company is trying to increase the level of security for its network. Roger is researching ways to increase the security by making passwords more complex.
?
What can Roger change in Windows to require more complex passwords?

A. Group Policy
B. Organizational unit
C. Password Policy
D. Access control List


Answer: C

Computer Science & Information Technology

You might also like to view...

Convert -1510 to a 4-bit integer in two’s complement format:

a. 11112 b. 100012 c. 000012 d. 00012

Computer Science & Information Technology

Which of the following is not considered to be application software?

A. database management software B. spreadsheet programs C. an operating system D. mathematical computation software

Computer Science & Information Technology

The text in the slide in the accompanying figure was created using a WordArt style.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

When you base a new master on an existing master, you start off with a ____ of the existing master with all of its master items.

A. list B. draft C. copy D. none of the above

Computer Science & Information Technology