A security administrator is reviewing the below output from a password auditing tool:
P@ss.
@pW1.
S3cU4
Which of the following additional policies should be implemented based on the tool’s output?

A.
Password age
B.
Password history
C.
Password length
D.
Password complexity
Explanation: