1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alecsey [184]
2 years ago
3

Which password policy would you implement if you want to prevent users from reusing passwords they have used recently?

Computers and Technology
1 answer:
Alex17521 [72]2 years ago
5 0

To prevent users from reusing passwords they have recently used an “enforce password history” policy.

An Enforce Password History policy can be used to ensure that users use new passwords every time they reset to ensure security. It can be set with a minimum password memory limit. Reusing old passwords weakens their integrity as people are more and more likely to use the same passwords across multiple platforms. They may also have previously revealed their password intentionally or unintentionally.

Some common password policies for a secure password system are:

  • Minimum eight character length
  • No special character requirement
  • No mandatory periodic password reset
  • Banning common passwords

These practices will create multiple difficult to guess random passwords and ensure password diversity which is key to a secure password bank.

You can learn more about Enforce Password History at

brainly.com/question/17193416

#SPJ4

You might be interested in
5. Bits are sent over a communications channel in packets of 12. (a) If the probability of a bit being corrupted over this chann
user100 [1]

Answer:

0.889

Explanation:

7 0
4 years ago
All of the following are tips for the Aspire English tests except
Alchen [17]

Answer:

A. there is no need to consider the elements of writing in the

underlined portion of a passage.

Explanation:

The options are:

A. there is no need to consider the elements of writing in the

underlined portion of a passage.

B. reread the sentence using your selected answer.

C. determine the best answer.

D. read and consider all of the answer choices before choosing the

one that best responds to the question.

All the options are correct given above except for the first option. The first option is not correct as it is not the right idea to not consider the elements of writing in the underlined portion of a passage. We just cannot neglect this. And hence, the correct option is A.

5 0
3 years ago
You want to securely erase data from your hard drive what can you use to do this and what is the process called
tankabanditka [31]
You could Factory Reset a computer or you could smash it with  a hammer
7 0
3 years ago
Read 2 more answers
Claudia has a bachelors degree in computer information systems and she has learned to use some popular software testing tolls wh
mihalych1998 [28]
Coder
website analyser
website maker
poll reader
3 0
3 years ago
Read 2 more answers
The first early astronomer to propose a sun-centered solar system was _____. Newton Brahe Copernicus Galileo
Airida [17]

Copernicus !

<em>Brainliestt? :o</em>

8 0
3 years ago
Read 2 more answers
Other questions:
  • Effective note-taking helps support<br><br> action.<br> distinction.<br> distraction.<br> retention.
    9·2 answers
  • ______ is the software that blocks a user from being able to access your computer.
    9·1 answer
  • A folder can contain only files? A. True B.False
    10·2 answers
  • the one disadvantage of a digital vom is a. difficulty in reading the lcd display. b. long scan times sometimes miss quickly cha
    6·2 answers
  • I really want to know the best way to deal as much heart as possible plz tell me
    7·2 answers
  • NEED HELP IMMEDIATELY!!
    15·1 answer
  • The ____ data source class that reduce your need for accessing individual Data Provider class when you are connecting to an Acce
    15·1 answer
  • Write passage on computer virus​
    10·2 answers
  • Robyn needs to ensure that a command she frequently uses is added to the Quick Access toolbar. This command is not found in the
    11·1 answer
  • Select the data type for each example below. <br> Possible answers<br> -Int<br> -float <br> -string
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!