A good password policy should contain which of the following rules?

A. Length
B. Expiration
C. Tokens
D. Smart card
E. Enrollment
F. Complexity
G. Biometrics


Answer:
A. Length
B. Expiration
F. Complexity

Computer Science & Information Technology

You might also like to view...

Reimplement the function strlen. Call your function strLen. The library function, strlen takes one char str[] argument, so you give strLen a char str[] argument as well.

What will be an ideal response?

Computer Science & Information Technology

Which statement about a totals query is true?

What will be an ideal response?

Computer Science & Information Technology

The reason that a blind copy of the purchase order is sent to receiving is to

A. inform receiving when a shipment is due B. force a count of the items delivered C. inform receiving of the type, quantity, and price of items to be delivered D. require that the goods delivered are inspected

Computer Science & Information Technology

A red exclamation mark in an e-mail message list indicates that the sender considers the e-mail spam. 

Answer the following statement true (T) or false (F)

Computer Science & Information Technology