An auditor carrying out a compliance audit requests passwords that are encrypted in the system to
verify that the passwords are compliant with policy. Which of the following is the BEST response to
the auditor?
![PrepAway - Latest Free Exam Questions & Answers](https://www.briefmenow.org/img/pa5.jpg)
A.
Provide the encrypted passwords and analysis tools to the auditor for analysis.
B.
Analyze the encrypted passwords for the auditor and show them the results.
C.
Demonstrate that non-compliant passwords cannot be created in the system.
D.
Demonstrate that non-compliant passwords cannot be encrypted in the system.