Before you run a password cracking program on your company’s computers to check for weak passwords, what should you do?

A. Tell all employees
B. Disable all accounts
C. Get permission from management
D. Change all passwords


C. Get permission from management

Computer Science & Information Technology

You might also like to view...

An object’s ________ count stores the number of ________ that refer to that object.

a) pointer count; handles and pointers b) reference count; pointers c) reference count; handles and pointers d) pointer count; handles

Computer Science & Information Technology

Text effects should be used at most for titles and ________

Fill in the blank(s) with correct word

Computer Science & Information Technology

When configuring a VDI environment, how can network redundancy be accomplished?

A. Multiple network adapters should be used in each host, and should be attached to separate physical switches. B. Multiple network adapters should be used in each host, and should be attached to separate virtual switches. C. Multiple virtual network adapters should be used in each host, and should be attached to separate physical switches. D. Multiple virtual network adapters should be used in each host, and should be attached to separate virtual switches.

Computer Science & Information Technology

A network technician installs a web server on the firewall. Which of the following methods should the technician implement to allow access to outside users without giving access to the inside network?

A. VLAN B. DMZ C. SNMP D. NTP

Computer Science & Information Technology