Which of the following is the MOST efficient method for granting the account non-privileged access to the host
A network inventory discovery application requires non-privileged access to all hosts on a network for
inventory of installed applications. A service account is created by the network inventory discovery
application for accessing all hosts. Which of the following is the MOST efficient method for granting the
account non-privileged access to the hosts?
Which of the following BEST explains why Ann is not required to change her password?
A group policy requires users in an organization to use strong passwords that must be changed every 15
days. Joe and Ann were hired 16 days ago. When Joe logs into the network, he is prompted to change his
password; when Ann logs into the network, she is not prompted to change her password. Which of the
following BEST explains why Ann is not required to change her password?
Which of the following will MOST increase the security of the passwords?
An auditing team has found that passwords do not meet best business practices. Which of the following
will MOST increase the security of the passwords? (Select TWO).
Which of the following passwords is the LEAST complex?
Which of the following passwords is the LEAST complex?
Which of the following is the BEST tool to use?
A security administrator wants to check user password complexity. Which of the following is the
BEST tool to use?
Which of the following could have prevented this from happening?
When Ann an employee returns to work and logs into her workstation she notices that, several desktop
configuration settings have changed. Upon a review of the CCTV logs, it is determined that someone
logged into Ann’s workstation. Which of the following could have prevented this from happening?
Which of the following types of user account options were enforced?
After a recent internal audit, the security administrator was tasked to ensure that all credentials must be
changed within 90 days, cannot be repeated, and cannot contain any dictionary words or patterns. All
credentials will remain enabled regardless of the number of attempts made. Which of the following types
of user account options were enforced? (Select TWO).
Which of the following types of password controls would achieve this goal?
An internal auditing team would like to strengthen the password policy to support special characters.
Which of the following types of password controls would achieve this goal?
Which of the following would BEST mitigate this risk?
The systems administrator notices that many employees are using passwords that can be easily guessed
or are susceptible to brute force attacks. Which of the following would BEST mitigate this risk?
Which of the following BEST supports this reasoning?
Sara, a security manager, has decided to force expiration of all company passwords by the close of
business day. Which of the following BEST supports this reasoning?