1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
goldfiish [28.3K]
3 years ago
9

A company asked you help mitigate the brute force attacks carried out against its users' Windows account passwords. You successf

ully removed the malware responsible for the attacks and need to better secure the passwords assigned to the user accounts without limiting the system's usability. Which of the following should be included in securing the user accounts? (Select THREE.)
Require user account passwords, Set failed logon restrictions, Require strong passwords
Computers and Technology
1 answer:
prohojiy [21]3 years ago
7 0

Answer:

The following options are true.

Explanation:

A corporation has requested the user to support minimize the brute force attacks on credentials of their Microsoft account holder's. They effectively eliminated the malware involved in those assaults and have to protect their credentials allocated towards their user profiles properly without restricting the usefulness of the program.

The following should be included in securing the user accounts are need credentials for the user profile, create logon constraints that failed as well as need powerful credentials.

You might be interested in
which program monitors the computer by looking for known trouble makers as well as suspicious behavior​
lys-0071 [83]

Answer:

i think spyware because spyware can collect almost any type of data, including personal information like internet surfing habits, user logins, and bank or credit account information. Spyware can also interfere with a user's control of a computer by installing additional software or redirecting web browsers.

Explanation:

3 0
3 years ago
1. asynchronous_communication
algol [13]
Communications in which data can be transmitted intermittently rather than in a steady stream.
3 0
3 years ago
Which of these statements about the truck driving occupation in the U.S. are accurate?
Airida [17]

Answer:

I'm unsure 38373672823

8 0
2 years ago
Read 2 more answers
after landing, you are tying down the aircraft when a person approaches and asks: "faa. are you the pilot of this aircraft?" wha
Elden [556K]
I wouldn’t say anything because no-one is allowed in the pilot room and also i am landing the aircraft down but the I would talk to them after the flight
3 0
2 years ago
Use the drop-down menus to complete statements about the Quick Steps function.
Sloan [31]

Answer:

  1. pray the god for your answer

Explanation:

I lllllllllllllll believe the Jesus

7 0
2 years ago
Other questions:
  • a supermarket having a sale on canned foods' the sale includes 12 cans of soup for 10.65 what is the unit price per can of soup
    6·2 answers
  • What do you call the destination router on the network endpoint?
    7·1 answer
  • ¿Qué es el Internet? ¿Cuál es el protocolo de Internet?
    11·1 answer
  • Bored can you talk to me
    5·2 answers
  • Which function in Excel tells how many
    6·1 answer
  • Once the CPU has fetched the data requested, what are the next steps in the process?
    15·1 answer
  • ARGENT !!20 POINTS <br> А ________ translates commands from a computer to draw lines on paper.
    10·2 answers
  • The most widely used computer device​
    6·2 answers
  • Your friends are having difficulties with their computer setups. Can you suggest a way to help each friend?
    5·1 answer
  • David is preparing a report to show the percentage increase in population in the United States in the last five years. Which fea
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!