Developers in your organization have created an application designed for the sales team. Salespeople can log on to the application using a simple password of 1234. However, this password does not meet the organization's password policy. Which of the following is the BEST response by the security administrator after learning about this?

A. Nothing. Strong passwords aren't required in applications

B. Modify the security policy to accept this password

C. Document this as an exception in the application's documentation

D. Direct the application team manager to ensure the application adheres to the organization's password policy


D. The application should be recoded to adhere to the company's password policy, so the best response is to direct the team manager to do so.

Computer Science & Information Technology

You might also like to view...

The identification of vulnerabilities in the physical protection scheme is usually done through ____________________ response exercises.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

What is not found on the Data Group on Print Preview tab?

A) Text File B) Email C) Excel D) Portrait

Computer Science & Information Technology

The ________ function returns the current date

Fill in the blank(s) with correct word

Computer Science & Information Technology

?In addition to opinions and exhibits, the ______________ must specify fees paid for the expert's services and list all other civil or ciminal cases in which the expert has testified.

A. ?verbal report B. ?informal report C. ?written report D. ?preliminary report

Computer Science & Information Technology