A company asked you help mitigate the brute force attacks carried out against its users’ Windows account passwords. You successfully removed the malware responsible for the attacks and need to better secure the passwords assigned to the user accounts without limiting the system’s usability.
Which of the following should be included in securing the user accounts? (Select THREE.)
A. Require user account passwords.
B. Require strong passwords.
C. Change each account type to Administrator.
D. Add each user to the Guests group.
E. Set failed logon restrictions.
F. Disable password complexity requirements.
A. Require user account passwords.
B. Require strong passwords.
E Set failed logon restrictions.
You might also like to view...
The ________ cell is the current cell, indicated by a dark border
Fill in the blank(s) with correct word
In what year did Apple introduce its first GUI home computer?
A. 1983 B. 1985 C. 1987 D. 1989
The process of sorting data into groups based on value, or sensitivity, is called "____________________."
Fill in the blank(s) with the appropriate word(s).
The second step in a vulnerability assessment is to determine the assets that need to be protected.
Answer the following statement true (T) or false (F)