1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
DaniilM [7]
3 years ago
9

A security team has downloaded a public database of the largest collection of password dumps on the Internet. This collection co

ntains the cleartext credentials of every major breach for the last four years. The security team pulls and compares users' credentials to the database and discovers that more than 30% of the users were still using passwords discovered in this list. Which of the following would be the BEST combination to reduce the risks discovered?
a. Password length, password encryption, password complexity
b. Password complexity least privilege, password reuse
c. Password reuse, password complexity, password expiration
d. Group policy, password history, password encryption
Computers and Technology
1 answer:
Scorpion4ik [409]3 years ago
4 0

Answer:

a. Password length, password encryption, password complexity

Explanation:

Under this scenario, the best combination would be Password length, password encryption, password complexity. This is because the main security problem is with the user's passwords. Increasing the password length and password complexity makes it nearly impossible for individuals to simply guess the password and gain access, while also making it extremely difficult and time consuming for hackers to use software to discover the password as well. Password excryption would be an extra layer of security as it encrypts the password before storing it into the database, therefore preventing eavesdroppers from seeing the password and leaked info from being used without decryption.

You might be interested in
PLEASE HELP ME
alexira [117]

Answer:

it won't be able to run

Explanation:

because computer runs on physical memory

5 0
2 years ago
Write a program that reads in ten numbers from the user and displays the distinct numbers. If a number entered by the user appea
Jobisdone [24]

Answer:

Here you go :)

Explanation:

Change this however you'd like:

array = []

for n in range(10):

   x = int(input("Enter integer: "))

   array.append(x)

dup = set(array)

print(", ".join(str(i) for i in dup))

7 0
3 years ago
Which one???????????????
uranmaximum [27]
I think it’s A, but sorry if I’m wrong it just looks like the one. :) Also this is my first time answering a question!
3 0
3 years ago
Read 2 more answers
What is the overall objective of an IT risk assessment? To assist IT management in establishing a budget for countermeasures To
QveST [7]
The overall objective of an IT risk assessment is to assist an organization in identifying risks and impacts.<span> The process includes discovering, correcting and preventing security problems.</span>
The IT risk assessment document identifies threats, estimates risks and determines how to manage them.
4 0
3 years ago
4. When the keyword ____________________ is followed by a parenthesis, it indicates a call to the superclass constructor.
Andreyy89

Answer:

Super

Explanation:

In object-oriented programming (OOP) language, an object class represents the superclass of every other classes when using a programming language such as Java. The superclass is more or less like a general class in an inheritance hierarchy. Thus, a subclass can inherit the variables or methods of the superclass.

Basically, all instance variables that have been used or declared in any superclass would be present in its subclass object.

Hence, when the keyword super is followed by a parenthesis, it indicates a call to the superclass constructor and it should be the first statement declared in the subclass constructor.

5 0
3 years ago
Other questions:
  • If parties in a contract are not _______, the contract can be canceled.
    7·1 answer
  • What might happen if a computer has too many applications running at one time?
    15·1 answer
  • Why is it a mistake to put e-mail address of people who don't know each other in the "to:" field
    9·2 answers
  • What is the first step that you should undertake when performing a visual analysis of a work of art?
    6·2 answers
  • All of the following are forms of verbal communication except
    12·2 answers
  • Procter &amp; Gamble regularly monitors trends and information posted about their products and brands by consumers on several We
    13·1 answer
  • The online underground is used _____. Select 3 options. by law-abiding citizens only on Black Friday for networking by criminal
    11·1 answer
  • How is an API different from a web application?
    10·1 answer
  • Requirements description:
    6·1 answer
  • Spoderman memes<br> im scared-
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!