1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
DaniilM [7]
3 years ago
9

A security team has downloaded a public database of the largest collection of password dumps on the Internet. This collection co

ntains the cleartext credentials of every major breach for the last four years. The security team pulls and compares users' credentials to the database and discovers that more than 30% of the users were still using passwords discovered in this list. Which of the following would be the BEST combination to reduce the risks discovered?
a. Password length, password encryption, password complexity
b. Password complexity least privilege, password reuse
c. Password reuse, password complexity, password expiration
d. Group policy, password history, password encryption
Computers and Technology
1 answer:
Scorpion4ik [409]3 years ago
4 0

Answer:

a. Password length, password encryption, password complexity

Explanation:

Under this scenario, the best combination would be Password length, password encryption, password complexity. This is because the main security problem is with the user's passwords. Increasing the password length and password complexity makes it nearly impossible for individuals to simply guess the password and gain access, while also making it extremely difficult and time consuming for hackers to use software to discover the password as well. Password excryption would be an extra layer of security as it encrypts the password before storing it into the database, therefore preventing eavesdroppers from seeing the password and leaked info from being used without decryption.

You might be interested in
You can add envelopes to existing documents. <br> a. True <br> b. False
Lemur [1.5K]
<span>The answer is true. Once documents are created, they may be accessed again and have envelopes pointing to them even when the documents are empty.</span>
3 0
2 years ago
The technique that allows you to have multiple logical lans operating on the same physical equipment is known as a.
sergiy2304 [10]

Answer:

As far as i know, it is Virtual Local Area Network (VLAN). You can read more about this here: https://en.wikipedia.org/wiki/VLAN

5 0
2 years ago
What is wearable technology? Provide at least one example
Alina [70]

Answer:

apple watches, airpods, vr headset i hope thats enough write in the comments and i will give you more

Explanation:

8 0
3 years ago
Read 2 more answers
12. In Justify the text is aligned both to the right and to the left margins, adding extra space between words as necessary *
Lena [83]

\blue{

\green{

Answer:

  • False

Explanation:

  • Because, aligment the tex are aligned in the centre of the page.

\pink{

\red{

4 0
2 years ago
Read 2 more answers
Which access object cannot be used to enter or edit data
kap26 [50]

Answer:

Should be B. table !

6 0
1 year ago
Read 2 more answers
Other questions:
  • Anna wants to open the Run dialog box to run her program file. Which keys should she press to open the Run dialog box?
    14·1 answer
  • A new company is upgrading a media workstation. The computer will be predominantly used for graphic intensive presentations, sli
    13·1 answer
  • A video streaming website uses 32 bit integers to count the number of times each video is played. In anticipation of some videos
    14·2 answers
  • ________ applications are software in which the vendor hosts the software online over the Internet and you do not to install the
    15·1 answer
  • What is the name of the amount of space between the content of a document and the edge of the page
    13·1 answer
  • In his article “is google making up stupid” Nicholas Carr uses a metaphor to suggest that
    11·2 answers
  • What should a password policy contain to reduce a hackers ability to crack the passwords?
    10·1 answer
  • • Open your Netbeans IDE and answer the following question
    5·1 answer
  • Select three advantages to using digital video.
    5·2 answers
  • Need help with this, will give brainliest
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!