You have been tasked with training end users in security best practices and have observed a trend among users in which many are writing down their passwords.
 
Which of the following procedures can be implemented to provide enough security to protect resources while minimizing the need for users to write down their passwords?

A. Disable password complexity requirement.
B. Disable required passwords.
C. Lengthen the time period between forced password changes.
D. Increase password length requirement.


Answer: C

Computer Science & Information Technology

You might also like to view...

The ____________ fstream member function closes a file stream. Explain why it is best to close a file when the program is through processing the data in the file.

a) close( ) b) overloaded operator <<( ) c) open( ) d) eof( ) e) flush( )

Computer Science & Information Technology

Which Windows feature allows you to change, configure, monitor, or troubleshoot most system settings, hardware, and software?

a.Application programming interface (API) b.Control Panel c.Settings charm d.System Preferences

Computer Science & Information Technology

Briefly describe a WEP key.

What will be an ideal response?

Computer Science & Information Technology

The title bar contains information relative to the open file including tools for changing the view of the file and for changing the zoom size of onscreen file contents.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology