You are the network administrator for a company. The company's policy is that the users are allowed to set their own passwords but that they must change their password every 30 days. You have just received a call from a user who can't log on because she forgot her password. After you change her password, which of the password options listed would you set in the user's account so that she will have to change the password when she logs on using the password you assigned?
A. User must change password at next logon.
B. User cannot change password.
C. Password never expires.
D. Account is disabled.
Answer: A
You might also like to view...
The enterprise continuity competency has the required functional perspective of ____.
A. manage, design B. manage C. manage, design, evaluate D. manage, evaluate
Which of the following statements appropriately defines a C-string that stores names of up to 25 characters?
a. char name[25]; b. string name[25]; c. char name[26]; d. string name[24]; e. None of these
Give a better method. Discuss how such a method might be implemented on a multiprocessor system where several threads could in fact attempt enterMutualExclusion() at precisely the same moment.
What will be an ideal response?
What are the steps to develop a secure OS?
What will be an ideal response?