1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
saw5 [17]
3 years ago
15

A company asked you help mitigate the brute force attacks carried out against its users' Windows account passwords. You successf

ully removed the malware responsible for the attacks and need to better secure the passwords assigned to the user accounts without limiting the system's usability. Which of the following should be included in securing the user accounts? (Select THREE.)a. Require user account passwords.
b. Require strong passwords.
c. Change each account type to Administrator
d. Add each user to the Guests group.
e. Set failed logon restrictions.
f. Disable password complexity requirements
Computers and Technology
1 answer:
alexdok [17]3 years ago
3 0

Answer:

a. Require user account passwords

e. Set failed logon restrictions

b. Require strong passwords

Explanation:

You might be interested in
What are the six critical components of an information system? Select three of the six components, and describe a potential vuln
Blizzard [7]
People, procedures and instructions, data, software, information technology infrastructure, internal controls.
7 0
3 years ago
How can a chart help to display your data? How does one choose the best type of chart to use, and how does one ensure that he or
Kay [80]
I think this should be under math. So let's say that you have tons of data and you need to sort it. A chart will help to graph that data in an organized formation.
6 0
3 years ago
Read integers from input and store each integer into a vector until -1 is read. Do not store -1 into the vector. Then, output al
weqwewe [10]

Answer:

The program in C++ is as follows:

#include <iostream>

#include <vector>

using namespace std;

int main(){

vector<int> nums;

int num;

cin>>num;

while(num != -1){

 nums.push_back(num);

 cin>>num; }  

for (auto i = nums.begin(); i != nums.end(); ++i){

    cout << *i <<endl; }

return 0;

}

Explanation:

This declares the vector

vector<int> nums;

This declares an integer variable for each input

int num;

This gets the first input

cin>>num;

This loop is repeated until user enters -1

while(num != -1){

Saves user input into the vector

 nums.push_back(num);

Get another input from the user

 cin>>num; }

The following iteration print the vector elements

<em> for (auto i = nums.begin(); i != nums.end(); ++i){ </em>

<em>     cout << *i <<endl; } </em>

6 0
2 years ago
ISO 400 is twice as sensitive and ISO 100 true or false
beks73 [17]

Answer:

Quite simply, when you double your ISO speed, you are doubling the brightness of the photo. So, a photo at ISO 400 will be twice brighter than ISO 200, which will be twice brighter than ISO 100.

Explanation:

ISO most often starts at the value of ISO 100. This is the lowest, darkest setting, also called the base ISO. The next full stop, ISO 200, is twice as bright, and ISO 400 is twice as bright than that. Thus, there are two stops between ISO 100 and 400, four stops between 100 and 1600, and so on.

4 0
2 years ago
If you have long column labels with columns so wide that they affect the readability of a worksheet you should first
jonny [76]
You should first .<span>consider how you could shorten the column labels.
Shortening the column labels could be easily done by dragging the column to the size that we want. But when shortening the column labels, some problems might occur such as the content might be distorted and in will become unevenly placed.</span>
5 0
3 years ago
Read 2 more answers
Other questions:
  • Your company is implementing a wireless network and is concerned that someone from a competing company could stand outside the b
    14·1 answer
  • In addition to training on the products and on company policy, it does not make sense to be prepared to speak about your company
    6·2 answers
  • Special programs that facilitate communication between a device and the os are called
    12·1 answer
  • This program will read integers from a file and find results from these integers. Open the file, test to make sure the file open
    12·1 answer
  • Assume that name has been declared suitably for storing names (like "Misha", "Emily" and "Sofia"). Assume also that stdin is a v
    9·1 answer
  • Communication of a message between two processes implies which of the following? (A) Synchronization (B) Atomic operation (C) Bl
    11·1 answer
  • What do I do if my friend wants me to watch a video at my house?
    8·2 answers
  • • &gt; Four 240-pin DDR3 SDRAM DIMM sockets arranged in two channels • &gt; Support for DDR3 1600+ MHz, DDR3 1333 MHz, and DDR3
    14·1 answer
  • You are working with an online tech service to fix a problem with installation of a program on your machine. You grant them remo
    13·1 answer
  • I like the impact that the increasing number of social grants may have on the things mothers​
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!