1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
DaniilM [7]
3 years ago
9

A security team has downloaded a public database of the largest collection of password dumps on the Internet. This collection co

ntains the cleartext credentials of every major breach for the last four years. The security team pulls and compares users' credentials to the database and discovers that more than 30% of the users were still using passwords discovered in this list. Which of the following would be the BEST combination to reduce the risks discovered?
a. Password length, password encryption, password complexity
b. Password complexity least privilege, password reuse
c. Password reuse, password complexity, password expiration
d. Group policy, password history, password encryption
Computers and Technology
1 answer:
Scorpion4ik [409]3 years ago
4 0

Answer:

a. Password length, password encryption, password complexity

Explanation:

Under this scenario, the best combination would be Password length, password encryption, password complexity. This is because the main security problem is with the user's passwords. Increasing the password length and password complexity makes it nearly impossible for individuals to simply guess the password and gain access, while also making it extremely difficult and time consuming for hackers to use software to discover the password as well. Password excryption would be an extra layer of security as it encrypts the password before storing it into the database, therefore preventing eavesdroppers from seeing the password and leaked info from being used without decryption.

You might be interested in
A PHP variable name a. can be a PHP reserved word b. can start with a letter, a digit, or two underscores c. can contain special
maw [93]

Answer:

The correct answers are c. can contain special characters d. is case-sensitive

Explanation:

Variable can be referred to as a container used for storing values such as numeric values, memory addresses, characters, character string so it can be used in any part of the program. Every programming language has rules that you must strictly follow while naming a variable, and some of the rules for naming variable in PHP are A variable name can contain letters, numbers, and characters  after the first character and A variable name is case sensitive.

3 0
3 years ago
This standard library function returns a random floating-point number in the range of 0.0 up to 1.0 (but not including 1.0).
natulia [17]

Answer:

The answer would be A: Random

Explanation:

The random() function returns a generated random number (a pseudorandom number)

5 0
3 years ago
How much memory did the first smartphone have?
hjlf

Memory 1 MB (2 × HM658512LTT PSRAM)

Storage 1 MB of NOR Flash expanded to 2 MB by Stacker compression + 32KB BIOS NOR Flash

6 0
3 years ago
Consider the following code: x=random.randint (1, 100) The randint is a ____.​
Mrrafil [7]
Random integer, in this case betweeen 1 and 100
5 0
3 years ago
You can separate words in a macro name by using the ____ character
Maru [420]
You can separate words in a macro name by using the underscore character.

A macro is considered as a small reusable computer program. It is efficient as it helps you save time by automating any repeated task.
In order to create a macro, you do not need to be an expert in programming, however, a little knowledge about it will help.

8 0
3 years ago
Read 2 more answers
Other questions:
  • What is the CPI of the central processing unit cpu of a computer
    13·1 answer
  • Computer virus is a<br> a. software<br> b. hardware<br> c. bacteria<br> d. none of these
    13·1 answer
  • Web browsers are used to browse the world wide web.
    5·2 answers
  • Determine the “answer” to the formula according to the spreadsheet below:<br><br> =A3 + B4 + D2.
    15·1 answer
  • 1What kind of rules protect everyone’s rights when we use each other’s content
    12·1 answer
  • Given that Apache and Internet Information Services (IIS) are the two most popular web application servers for Linux and Microso
    10·1 answer
  • Which of the following are the lines defining the borders of a shape? (1 point)
    12·1 answer
  • When does a soft page break occur in a document
    9·1 answer
  • How do you get off of the comments after you look at them wit out going all the way off the app?
    15·1 answer
  • What is the importance of test documentation?
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!