You need strong passwords to keep unwanted users from logging onto your computer and/or from seeing your personal computer files. What are the minimum components of a strong password and what are some common examples of a weak password?
What will be an ideal response?
A strong password consists of at least eight characters of upper- and lowercase letters and numbers. A weak password includes common personal information, such as birthdays and addresses.
You might also like to view...
The name of the report as well as the parameter, if a parameter query is used, can be found in the ________ of the report
Fill in the blank(s) with correct word
The entire DNS tree is called the DNS namespace.
Answer the following statement true (T) or false (F)
Vulnerability ________ is an important tool for information security management as it identifies all the security weaknesses before an attacker can exploit them.
A. assessment B. scoring C. reporting D. research
Typically, a switched network reaches saturation when its network utilization is at ____ percent.?
A. ?55 B. ?60 C. ?80 D. ?100