Roger’s company is trying to increase the level of security for its network. Roger is researching ways to increase the security by making passwords more complex.
?
What can Roger change in Windows to require more complex passwords?
A. Group Policy
B. Organizational unit
C. Password Policy
D. Access control List
Answer: C
Computer Science & Information Technology
You might also like to view...
Convert -1510 to a 4-bit integer in two’s complement format:
a. 11112 b. 100012 c. 000012 d. 00012
Computer Science & Information Technology
Which of the following is not considered to be application software?
A. database management software B. spreadsheet programs C. an operating system D. mathematical computation software
Computer Science & Information Technology
The text in the slide in the accompanying figure was created using a WordArt style.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
When you base a new master on an existing master, you start off with a ____ of the existing master with all of its master items.
A. list B. draft C. copy D. none of the above
Computer Science & Information Technology