1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
DaniilM [7]
3 years ago
9

A security team has downloaded a public database of the largest collection of password dumps on the Internet. This collection co

ntains the cleartext credentials of every major breach for the last four years. The security team pulls and compares users' credentials to the database and discovers that more than 30% of the users were still using passwords discovered in this list. Which of the following would be the BEST combination to reduce the risks discovered?
a. Password length, password encryption, password complexity
b. Password complexity least privilege, password reuse
c. Password reuse, password complexity, password expiration
d. Group policy, password history, password encryption
Computers and Technology
1 answer:
Scorpion4ik [409]3 years ago
4 0

Answer:

a. Password length, password encryption, password complexity

Explanation:

Under this scenario, the best combination would be Password length, password encryption, password complexity. This is because the main security problem is with the user's passwords. Increasing the password length and password complexity makes it nearly impossible for individuals to simply guess the password and gain access, while also making it extremely difficult and time consuming for hackers to use software to discover the password as well. Password excryption would be an extra layer of security as it encrypts the password before storing it into the database, therefore preventing eavesdroppers from seeing the password and leaked info from being used without decryption.

You might be interested in
To prevent unauthorized access and use, at a minimum a company should have a written __________ that outlines the activities for
Maru [420]

Answer:

a. acceptable use policy (AUP)

Explanation:

An acceptable use policy (AUP) is a document where everyone has to sight it before to receive access to a company's network.

Employees or students have to sight politics like:

- Never try to break the security system.

- Never posting commercial content.

- Never send spam.

- Report any suspicious behavior.

3 0
4 years ago
Claire writes a letter to her grandmother, in which she describes an amusement park she visited last week. She adds pictures of
alexgriva [62]

Claire uses the <u>Crop option</u> from the Format tab to remove unwanted parts of the pictures.  

<u>Explanation:</u>

In Microsoft Word, after inserting a picture, when we click on the picture to select it, the ribbon shows the format options. Various options are available for formatting a picture, however, in order to cut out the unwanted portion Claire needs to use the crop option.

Crop options allow the user to cut resize an image by cutting out the part of the picture user decides.

<u>To crop the picture follow the procedure given below:</u>

  • Double click on the image
  • Click the format tab to size the image
  • Click crop, perform cropping using the handles appearing at the edge of image.
  • Drag handles to crop and save them.
7 0
3 years ago
Desktop operating systems sometimes are called ______ operating systems because they also work in conjunction with a server oper
valina [46]
<span>Client, because they are a part of the server operating system request line. The client asks for a request for information or data from the provider (the server) and the server provides this to its client (the desktop computer). They work together hand in hand one is recieving information and one is sending information</span>
4 0
4 years ago
Can someone help answer this. I'm on a time crisis rn and need to pass or I fail the class. There are games that cannot be descr
const2013 [10]
  • There are games that cannot be described as a single or two genres.
  • Yes there should be some genres invented.
  • Because games are now become a everyday requirement for entertainment .

Uses of genre:-

  • Genres are used in Readers as well as writers.
  • By using genre patterns in writers it has been accepted by readers for accomplishing their purposes.
  • Genres allow both writers and readers to establish a working relationship between each other.
  • Both writers and readers are required for gamers and game publishers.
  • So Genres are very useful to them.
5 0
3 years ago
Hello, please help write code in C++. Primary U.S. interstate highways are numbered 1-99. Odd numbers (like the 5 or 95) go nort
krok68 [10]

Answer:

Please Find attached  c++ code file.

Explanation:

  1. Ask User to enter highway number.
  2. Check if highway is primary or auxiliary.
  3. Check if highway number is even / odd.
  4. Find Primary high number for an auxiliary highway

Check if highway is primary or auxiliary.

Use if condition to check if the entered number is in between 0 and 99.If it's true than the highway is primary otherwise it's an auxiliary highway.

Check if highway number is even / odd.

To check if a number is even or odd we use simple modulo formula. In mathematics modulo returns the reminder of a division operation on two numbers.If modulo of a number and 2 is equal to zero than that number is an even number other wise its an odd number.

(Any number ) mod 2 = 0

Find Primary high number for an auxiliary highway

As mentioned in the question last two digits of highway number is the number of primary high.

To Find last two digits of number apply modulo operation on highway number and 100. it will provide last two digits of number specifying our primary highway.

Download cpp
3 0
4 years ago
Other questions:
  • In an open computer network such as the internet, hipaa requires the use of _____. in a closed system such as a local area netwo
    7·1 answer
  • Maggie is preparing a document.she wants to open the help menu to sort out a formatting problem.which key should she press to op
    15·2 answers
  • In a microsoft word document, what is the amount of space that appears between paragraphs called?
    14·1 answer
  • Universal Containers (UC) has decided to build a new, highly sensitive application on the Force platform. The security team at U
    11·1 answer
  • What does the following code print out? (10 points) int[] array = { 1, 4, 3, 6, 8, 2, 5}; int what = array[0]; // scan the array
    14·1 answer
  • Create ER Models &amp; Normalization for the following scenarios:
    5·1 answer
  • When your purchases are swiped over the bar-code reader at the point-of-sale terminals at Wal-Mart, a _____ records the data.
    8·1 answer
  • Queues can be represented using linear arrays and have the variable REAR that point to the position from where insertions can be
    12·1 answer
  • What programming language does the LMC 'understand'?
    5·1 answer
  • You are assigned by your teacher to perform the assembly of all the parts of the computer in preparation for the hands on activi
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!