Which of the following is not a characteristic of a weak password?

A. Eight characters in length and include one or more uppercase letters, numbers, and symbols
B. Uses default passwords such as password, admin, system, and guest
C. Any sequence that includes a user name
D. Use of a word from a dictionary


Answer: A

Computer Science & Information Technology

You might also like to view...

Flash files that you create are known as ____.

A. animations B. documents C. sheets D. flicks

Computer Science & Information Technology

A(n) ____________________ contains information that does not change during the course of program execution.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

In the following function to push data into a stack, the condition "if (!success)" tests _____.void insertData (STACK_NODE** pStackTop){   char charIn;   bool success;   for (int nodeCount = 0; nodeCount < 10; nodeCount++)   {      charIn = rand() % 26 + 'A';      success = push(pStackTop, charIn);      if (!success)      {         exit (100);      } // if   } // for} // insertData

A. if the stack is empty B. if an attempt to insert duplicate data was made C. for underflow D. for overflow

Computer Science & Information Technology

Case PPT 7-1Amber is an assistant in the human resources department of a large company. She often works with documents and presentations that contain sensitive employee information. She is currently working on a presentation that is part of a package used to recruit top-level executives. Amber wants to prepare the presentation for the CD. The Package Presentation for CD command is located in the ____ section of the File tab.

A. Info B. Save & Send C. Print D. Options

Computer Science & Information Technology