1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lisa [10]
3 years ago
12

The following are three possible logon scenarios. Explain why option (c) below is preferable in terms of system security. a. Wel

come to XYZ computing Enter username: jones Invalid username Enter username: b. Welcome to XYZ computing Enter username: smith Enter password: password Invalid access Enter username: c. Enter username: smith Enter password: password Invalid access Enter username: smith Enter password: FpQr56 Welcome to XYZ computing
Computers and Technology
1 answer:
SashulF [63]3 years ago
4 0

Answer:

because the password being used is of high quality

Explanation:

Option C is the most preferable in terms of system security because the password being used is of high quality. Meaning that it contains lower case and capital case letters as well as numbers. It is also a random mix of all three and is not a common word or name. The length of the password is normal but could be longer for better safety. These things make it very difficult and time-consuming for a software program to guess the password, and nearly impossible for an individual to guess.

You might be interested in
Why do electronic devices gather so much dust? Thanks
Fudgin [204]
Any electrical device that produces any type of air kind of gets collected as the air flows in or out
3 0
3 years ago
May I ask, when you accidently drop your laptop into a pool,...(water) . Will the Data and Many other information... inside the
bagirrra123 [75]
Not necessarily, you should try getting it fixed
3 0
3 years ago
Read 2 more answers
A(n) _____ is a fake online persona created to promote a particular point of view, often in praise of a firm, product, or indivi
drek231 [11]

Answer:

<u>Sock puppet</u>

Explanation:

A sock puppet, a reference to a puppet created by placing a sock over one's hand, is a misleading or fake online identity created to promote a particular point of view, often in praise of a firm, organization, product, or individual; to manipulate public opinion or to argue, bully or review products. Regardless of the purpose it was created for, sock puppets are rarely welcome in online communities and forums.

4 0
4 years ago
A user purchased a new smart home device with embedded software and connected the device to a home network. The user then regist
Rzqust [24]

Answer:

C. The user is sent an e-mail appearing to be from the manufacturer, asking the user to confirm account password by clicking on a link in the e-mail and entering password on the resulting page.

Explanation:

Phishing attack is a cyber atttack in which user is sent an email which he thinks is useful. When the user open the email and does as instructed in the email his account gets locked. His personal information is haccked and then rannsom is demanded to release that information. The hacckers usually steal credit card information and bank details of the user which are misused.

7 0
4 years ago
Access 1.04 knowing your audience
luda_lava [24]

Answer:

What?

Explanation:

I would like to help, but what is the question

4 0
4 years ago
Other questions:
  • Declare an array reference variable, week, and initialize it to an array containing the strings "mon", "tue", "wed", "thu", "fri
    15·1 answer
  • Write a Python function called validateCreditCard that takes 8-digit credit card number as the input parameter (string value) an
    8·1 answer
  • A flowchart that depicts the relationships among the input, processing, and output of an AIS is
    6·1 answer
  • Technical colleges offer certification in audio engineering through programs that are normally from 2 to 6 months long. False Tr
    14·1 answer
  • In which of the following situations should you expect to provide your Social Security number?
    13·1 answer
  • The part of a computer that provides access to the internet
    6·1 answer
  • To display data in a certain manner, like alphabetical order, is called
    5·2 answers
  • Explain the following as used in Tally Accounting Software:
    8·1 answer
  • What risks were involved?
    15·2 answers
  • A penetration tester is experimenting with Network Mapper (Nmap) on a test network as a privileged user. The tester would like t
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!