1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lara [203]
3 years ago
5

Which one of the following rules for selecting a password is the best?

Computers and Technology
2 answers:
Studentka2010 [4]3 years ago
8 0

Answer:B IS CORRECT

Explanation:

horsena [70]3 years ago
3 0

Answer:

(b) 7 characters: 4 Numbers, 1 Lowercase Letter, 1 Uppercase letter, 1 Symbol

Explanation:

The best rule that makes a password great is that rule that increases the entropy of the password. The entropy of a password is the measure of how easy it is for the password to be cracked e.g by guessing, by brute force cracking, by dictionary attacks and other related cracking methods.

A rule that makes use of a logical combination of the four types of characters - digits, lowercase letters, uppercase letters and special symbols - gives a greater strength to the password than the rules that just make use of the some of the four types of characters.

Increasing the length of the password too is a great way of increasing the entropy of the password. But then, if there is a trade-off between length and combination, the latter is better.

You might be interested in
A10:A20 Refer to values in
Keith_Richards [23]
The range of cells in column A and rows 10 through 20
8 0
2 years ago
Write an if statement that prints the message “Application accepted” if the variable workExperience is greater than or equal to
katovenus [111]
If workExperience >= 2 or CollegeDegree is true:
print “Application accepted”
else:
print “Application denied”

4 0
3 years ago
Read 2 more answers
R15. Suppose there are three routers between a source host and a destination host. Ignoring fragmentation, an IP datagram sent f
maria [59]

Answer:

The answers are: an IP datagram, and 3 forwading tables.

Explanation:

An IP datagram sent from a source host to a destination host will travel through 8 interfaces. 3 forwarding tables will be indexed to move the datagram from source to destination.

8 0
3 years ago
True or false windows 98 and windows xp are examples of an operating system?
rodikova [14]

Answer:

true

Explanation:

3 0
2 years ago
2. Assume that the reference variable r refers to a serializable object. Write code that serializes the object to the file Objec
Dafna11 [192]

Answer:

Carmen Katrit rgrtun fjdidnf cucixizshdbdbdjsisjsdndbdhdhduehebbwwwhwususiussjhsdbd

3 0
2 years ago
Other questions:
  • Which of the following are examples of the concept of layered access in physical security? Select one: a. Firewall, IDS, CCTV b.
    11·2 answers
  • Write a class called (d) Teacher that has just a main method. The main method should construct a GradeBook for a class with two
    7·1 answer
  • What are the five types of alignment in Word?
    12·2 answers
  • What is the purpose of the SMTP command "HELO"
    15·1 answer
  • The frequency of a sine wave is defined as:
    8·1 answer
  • What is the trickiest time of the day to drive? A. Early morning B. Late night C. After the sun sets
    8·2 answers
  • What are Manuscript signs​
    8·1 answer
  • What is the most commonly used tab in the Filter dialog box?
    9·2 answers
  • Hurry please i need this ASAP<br><br>What might be some advantages to keeping CSS and HTML separate?
    8·1 answer
  • Write C++
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!