Which two security measures could be used by a company to prevent data exposure after a security breach that involved user passwords? (Select two.)
A) Implement WPA2.
B) Require five or more password characters.
C) Implement multifactor authentication.
D) Educate users.
E) Deploy file and folder encryption.
F) Use drive encryption.
C, D
You might also like to view...
If you create a field in a table that combines the first name and last fields from the same table, you need to use the ________
A) Calculated data type B) multivalued field property C) Text data type D) OLE Object data type
An option group is an example of an unbound control
Indicate whether the statement is true or false
Which of the following interfaces, developed by Microsoft, is a set of interfaces that enable applications to access data stored in a database management system (DBMS)?
A. OLE DB B. ODBC C. ADO D. JDBC
Conventional dial-up connects to the Internet at a maximum of ____.
A. 10.2 Kbps B. 28.8 Kbps C. 56 Kbps D. 128 Kbps