1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
PIT_PIT [208]
3 years ago
14

You have been tasked with training end users in security best practices and have observed a trend among users in which many are

writing down their passwords.
Which of the following procedures can be implemented to provide enough security to protect resources while minimizing the need for users to write down their passwords?
A. Disable password complexity requirement.
B. Disable required passwords.
C. Lengthen the time period between forced password changes.
D. Increase password length requirement.
Computers and Technology
1 answer:
quester [9]3 years ago
7 0

Hi, A Tech-Savvy here.

Answer:

(C) Lengthen the time period between forced password changes.

You might be interested in
What's usually kept in database?
Levart [38]
I think this is the answer. I tried. Databases<span> may be </span>stored<span> on a computer and examined using a programs.</span>
7 0
3 years ago
Read 2 more answers
Task manager is showing an application as “not responding.” what can you do?
34kurt
I think it's b because "end application" would make the most sence
8 0
3 years ago
A.)navigate
Vaselesa [24]

Answer:

start with what you know

Explanation:

you can learn a lot from it

7 0
3 years ago
A type of printer is used to price model and shape is called
balandron [24]

Either a 3d,2d printer, or a price label gun

7 0
4 years ago
True or False: A private access modifier is normally used with methods
Veseljchak [2.6K]
I’m pretty sure it’s true! Brainliest if correct
4 0
3 years ago
Read 2 more answers
Other questions:
  • What operating system uses Fastboot?
    10·2 answers
  • If you find yourself in a position where you need to restore an object or container within active directory that has been inadve
    6·1 answer
  • Someone may choose to own a car instead of leasing because:
    14·2 answers
  • To run a PHP application that has been deployed on your own computer, you can enter a URL in the address bar of your browser tha
    13·1 answer
  • This type of software is used for creating slid shows.
    8·1 answer
  • Why do you think they added the wait .5 seconds block?
    13·1 answer
  • Stacy is in the process of creating a storyboard for her personal website, but she is unable to decide which storyboarding techn
    13·1 answer
  • How am i supposed to add subtitles to a video without have to waist money???
    7·1 answer
  • CISC vs RISC processors might be used, and come up with environments where one processor would outperform the other.
    9·1 answer
  • How do I find unwanted programs on my computer?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!