Which of the following is the BEST tool to use?
A security administrator wants to check user password complexity. Which of the following is the BEST tool to use?
Which of the following passwords is the LEAST complex?
Which of the following passwords is the LEAST complex?
Which of the following will MOST increase the security …
An auditing team has found that passwords do not meet best business practices. Which of the following will MOST increase the security of the passwords? (Select
TWO).
Which of the following BEST explains why Ann is not req…
A group policy requires users in an organization to use strong passwords that must be changed every 15 days. Joe and Ann were hired 16 days ago. When Joe
logs into the network, he is prompted to change his password; when Ann logs into the network, she is not prompted to change her password. Which of the following
BEST explains why Ann is not required to change her password?
Which of the following is the MOST efficient method for…
A network inventory discovery application requires non-privileged access to all hosts on a network for inventory of installed applications. A service account is
created by the network inventory discovery application for accessing all hosts. Which of the following is the MOST efficient method for granting the account nonprivileged access to the hosts?
Which of the following should the system administrator …
The system administrator is tasked with changing the administrator password across all 2000 computers in the organization. Which of the following should the
system administrator implement to accomplish this task?
which of the following?
Use of group accounts should be minimized to ensure which of the following?
which rates the ability of a system to correctly authen…
Which of the following is a measure of biometrics performance which rates the ability of a system to correctly authenticate an authorized user?
which of the following authentication types?
The security department has implemented a new laptop encryption product in the environment. The product requires one user name and password at the time of
boot up and also another password after the operating system has finished loading. This setup is using which of the following authentication types?
Which of the following authentication methods is Sara using?
In order for Sara, a client, to logon to her desktop computer, she must provide her username, password, and a four digit PIN. Which of the following authentication
methods is Sara using?