A company asked you help mitigate the brute force attacks carried out against its users’ Windows account passwords. You successfully removed the malware responsible for the attacks and need to better secure the passwords assigned to the user accounts without limiting the system’s usability.
 
Which of the following should be included in securing the user accounts? (Select THREE.)

A. Require user account passwords.
B. Require strong passwords.
C. Change each account type to Administrator.
D. Add each user to the Guests group.
E. Set failed logon restrictions.
F. Disable password complexity requirements.


A, B and E.

Computer Science & Information Technology

You might also like to view...

A(n) ____ represents a value that can change.

A. variable B. code C. algorithm D. memory module

Computer Science & Information Technology

The disaster recovery planning team needs to establish both monitoring functions and ________

Fill in the blank(s) with correct word

Computer Science & Information Technology

A folder has both NTFS and shared folder permissions applied. What is the result of this action?

A) Whichever permission restricts the remote user the most is the one in effect. B) The NTFS permissions are in effect. C) The shared folder permissions are in effect. D) All permissions assigned are in effect.

Computer Science & Information Technology

The data type of each ____ depends on the specific application.

A. pointer B. node C. address D. link

Computer Science & Information Technology