The entity needs to remember only one strong password to access all resources instead of trying to remember and manage different passwords for different systems. We call this ____.

A. password recycling
B. password reuse
C. password grouping
D. password synchronization


Answer: D

Computer Science & Information Technology

You might also like to view...

When creating a calculated field, the new field name must be followed by a colon and each field name that will be used in the expression must be enclosed within in its own pair of ________

A) asterisks (*) B) brackets ([]) C) pound signs (#) D) quotation marks (")

Computer Science & Information Technology

A ________ is a fake network segment with multiple clients and servers.

trap honeypot IDS virtual network

Computer Science & Information Technology

List five different categories of information resources a troubleshooter can use to find additional information about a problem situation.

What will be an ideal response?

Computer Science & Information Technology

Setting the clear property value of an element to float allows nearby elements to float to the left or right of the element. ____________________

Answer the following statement true (T) or false (F)

Computer Science & Information Technology