1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
krok68 [10]
3 years ago
10

What should a password policy contain to reduce a hackers ability to crack the passwords?

Computers and Technology
1 answer:
Aleksandr-060686 [28]3 years ago
4 0

Creating a strong password<span> is an important part of protecting your account.  T</span>he following character sets should all be included in every password:

uppercase letters such as A, B, C;                                                                    lowercase letters such as a, b,c;                                                                        numerals such as 1, 2, 3;                                                                              special characters such as $, ?, &;                                                                    alt characters such as µ, £, Æ. (Cliff) 

<span>Misspell words or create acronyms;
</span><span>Use punctuation characters to separate words or acronyms;
</span><span>Change passwords every 6 to 12 months;
</span>Use variable-length passwords;<span> 
</span><span>Don’t rely completely on similar-looking characters, such as 3 instead of <span>E, 5 </span>instead of S,or <span>! </span>instead of 1.</span> 
You might be interested in
What is it called when a additional document is added to an email
LUCKY_DIMON [66]
A new data to save last chest
8 0
3 years ago
Read 2 more answers
Unicode is a world standard to represent _________________
horsena [70]

Answer:

characters.

Explanation:

We need to represent characters in binary format so that they can be stored in computer memory. Earlier, ASCII (American Standard Code for Information Interchange) representation was commonly used for english characters. But ASCII was found to be insufficient for representing multilingual and special characters.Unicode character representation was developed to overcome this limitation.

8 0
3 years ago
The device used to connect a network to the internet is called a
melamori03 [73]
That's called a router. you can hook up several computers to a router
8 0
4 years ago
What are some causes of the number of bytes on the wire exceeding the number of bytes being captured?
Aneli [31]
<span>Some causes of the number of bytes on the wire exceeding the number of bytes being captured is that </span>not everything is being captured or that partial packets may be captured which could lead to incorrect analysis. If there are regularly more bytes on the wire than captured, then, it is possible that the computer on which Wireshark is running is not able to keep up with the interface.
7 0
3 years ago
Read 2 more answers
What are the four steps of the research process?
pishuonlain [190]

Answer:

Step 1: Identify the Problem

Step 2: Review the Literature. ...

Step 3: Clarify the Problem Step 4: Clearly Define Terms and Concepts.

7 0
3 years ago
Other questions:
  • In this mode, your presentation will fill up the entire screen. Auto Default Standard Window
    6·2 answers
  • Which network component connects a device with the transmission media?
    9·1 answer
  • When typing a cell, hitting Tab will bring which result?
    12·1 answer
  • . In many instances an IP address is used to access a server rather than a URL because a URL is more difficult to set up and eas
    10·1 answer
  • When installing a device driver, start the computer in
    6·1 answer
  • In the circuit shown in the figure above, what will happen when switches S1 and S3 are both closed? 
    8·1 answer
  • To specify AutoCorrect rules and exceptions to the rules, click File to open the Backstage view, click ____ , and then click Pro
    6·1 answer
  • Write a method named collapse that accepts an array of integers as a parameter and returns a new array where each pair of intege
    6·1 answer
  • Which testing is an example of non-functional testing? A. testing a module B. testing integration of three modules C. testing a
    13·1 answer
  • Write a program that reads a list of integers, and outputs the two smallest integers in the list, in ascending order. The input
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!