1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
krok68 [10]
3 years ago
10

What should a password policy contain to reduce a hackers ability to crack the passwords?

Computers and Technology
1 answer:
Aleksandr-060686 [28]3 years ago
4 0

Creating a strong password<span> is an important part of protecting your account.  T</span>he following character sets should all be included in every password:

uppercase letters such as A, B, C;                                                                    lowercase letters such as a, b,c;                                                                        numerals such as 1, 2, 3;                                                                              special characters such as $, ?, &;                                                                    alt characters such as µ, £, Æ. (Cliff) 

<span>Misspell words or create acronyms;
</span><span>Use punctuation characters to separate words or acronyms;
</span><span>Change passwords every 6 to 12 months;
</span>Use variable-length passwords;<span> 
</span><span>Don’t rely completely on similar-looking characters, such as 3 instead of <span>E, 5 </span>instead of S,or <span>! </span>instead of 1.</span> 
You might be interested in
Why is it hard for some people to keep a promise even one that they make to themselves​
tresset_1 [31]

Answer:

Awww what happened? Sometimes its hard for me to keep a promise.

Explanation:

7 0
3 years ago
Read 2 more answers
[c++] Write a recursive function takes a word string as input argument and reverse the word. Print out the results of recursive
Aleks04 [339]
I will try to give you the best answer I can possibly come up with. 
The easy way to get it is to store it into an array of strings and print the array of string backwards. You can do that by starting at the last part of the array down to the first letter.
3 0
3 years ago
MCQ: A computer network is interconnection of two or more:
timama [110]

Answer:

computers

Explanation:

it is because other remaining are not able to access network

4 0
2 years ago
Can i add ADSence on bangla content in blogsopt website?
Inga [223]

Answer:

I do not think you can! However, I am not sure since I mainly use Wix!!!

Explanation:

8 0
3 years ago
Kristine has been receiving many emails from a certain address. She thinks that these emails might harm her computer. Which acti
Paraphin [41]
Report the email adress then block them 
6 0
3 years ago
Read 2 more answers
Other questions:
  • 4. The same data source can be used multiple times in creating mail-merge documents.
    7·1 answer
  • Write structured pseudocode to show the following: print “Reorder” when the quantity is less than 20; otherwise print “OK”.
    15·1 answer
  • ________________are programs that designed to help users to be more productive with their personal tasks
    11·2 answers
  • Methods that require you to use an object to call them are called ____ methods.1. accessor
    7·1 answer
  • as the new hr manager hired by a company to clean up some of the company's problems,analyse the system requirements for the comp
    14·1 answer
  • The famous study entitled ""Protection Analysis: Final Report"" focused on a project undertaken by ARPA to understand and detect
    14·1 answer
  • I WILL GIVE BRAINLIEST TO WHO ANSWERS FIRST AND CORRECTLY.
    8·1 answer
  • Powerful IT security systems are needed to defend against what appears to be authorized access to a network or application. Sele
    6·1 answer
  • A __________ attack is a bot attack on a computer system or network that causes a loss of service to users.
    15·1 answer
  •  A programming paradigm is a method used to program a computer that guides the solving of a problem or performing of a task. Whi
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!