A company asked you help mitigate the brute force attacks carried out against its users’ Windows account passwords. You successfully removed the malware responsible for the attacks and need to better secure the passwords assigned to the user accounts without limiting the system’s usability.
 
Which of the following should be included in securing the user accounts? (Select THREE.)

A. Require user account passwords.
B. Require strong passwords.
C. Change each account type to Administrator.
D. Add each user to the Guests group.
E. Set failed logon restrictions.
F. Disable password complexity requirements.


A. Require user account passwords.   

B. Require strong passwords. 

E Set failed logon restrictions.

Computer Science & Information Technology

You might also like to view...

The ________ cell is the current cell, indicated by a dark border

Fill in the blank(s) with correct word

Computer Science & Information Technology

In what year did Apple introduce its first GUI home computer?

A. 1983 B. 1985 C. 1987 D. 1989

Computer Science & Information Technology

The process of sorting data into groups based on value, or sensitivity, is called "____________________."

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

The second step in a vulnerability assessment is to determine the assets that need to be protected.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology