List and describe two specific password security options that you can configure in Windows Server 2008.

What will be an ideal response?


Enforce password history-Enables you to require users to choose new passwords when they make a password change, because the system can remember the previously used passwords

Maximum password age-Permits you to set the maximum time allowed until a password expires

Minimum password age-Permits you to specify that a password must be used for a minimum amount of time before it can be changed

Minimum password length-Enables you to require that passwords are a minimum length

Passwords must meet complexity requirements-Enables you to create a filter of customized password requirements that each account password must follow

Store password using reversible encryption-Enables passwords to be stored in reversible encrypted format (similar to clear-text passwords) and used when applications or application processes must employ user passwords

Computer Science & Information Technology

You might also like to view...

Which of the following statements is false?

a. Java makes concurrency available to you through the language and APIs. b. Concurrency is a subset of parallelism. c. Today’s multi-core computers have multiple processors that can perform tasks in parallel. d. Java programs can have multiple threads of execution, where each thread has its own method-call stack and program counter, allowing it to execute concurrently with other threads. This capability is called multithreading.

Computer Science & Information Technology

What is the distinction between the virtualization approach advocated by Xen and the style of microkernel advocated by the Exokernel project? In your answer, highlight two things they have in common and two distinguishing characteristics between the approaches.

What will be an ideal response?

Computer Science & Information Technology

Which of the following port number is commonly associated with Telnet?

a. Port 20 b. Port 21 c. Port 23 d. Port 25

Computer Science & Information Technology

Which of the following is a measure of biometrics performance which rates the ability of a system to correctly authenticate an authorized user?

A. Failure to capture B. Type II C. Mean time to register D. Template capacity

Computer Science & Information Technology