Which of the following is the BEST tool to use?
A security administrator wants to check user password complexity. Which of the following is the
BEST tool to use?
Which of the following passwords is the LEAST complex?
Which of the following passwords is the LEAST complex?
Which of the following will MOST increase the security …
An auditing team has found that passwords do not meet the best business practices.
Which of the following will MOST increase the security of the passwords? (Choose two.)
Which of the following BEST explains why Ann is not req…
A group policy requires users in an organization to use strong passwords that must be changed every 15 days.
Joe and Ann were hired 16 days ago. When Joe logs into the network, he is prompted to change his password;
when Ann logs into the network, she is not prompted to change her password. Which of the following BEST
explains why Ann is not required to change her password?
Which of the following is the MOST efficient method for…
A network inventory discovery application requires non-privileged access to all hosts on a network for inventory
of installed applications. A service account is created by the network inventory discovery application for
accessing all hosts. Which of the following is the MOST efficient method for granting the account non-privileged
access to the hosts?
Which of the following should the system administrator …
The system administrator is tasked with changing the administrator password across all 2000 computers in the
organization. Which of the following should the system administrator implement to accomplish this task?
Use of group accounts should be minimized to ensure the…
Use of group accounts should be minimized to ensure the following:
which rates the ability of a system to correctly authen…
Which of the following is a measure of biometrics performance which rates the ability of a system to correctly
authenticate an authorized user?
Which of the following authentication types is this set…
The security department has implemented a new laptop encryption product in the environment. The product
requires one user name and password at the time of boot up and also another password after the operating
system has finished loading.
Which of the following authentication types is this setup using?
Which of the following authentication methods is Sara using?
In order for Sara, a client, to logon to her desktop computer, she must provide her username, password, and a
four-digit PIN.
Which of the following authentication methods is Sara using?