subject

A security analyst is reviewing the password policy for a service account that is used for a critical network service. The password policy for this account is as follows:Enforce password history: Three passwords rememberedMaximum password age:30 daysMinimum password age:Zero daysComplexity requirements: At least one special character, one uppercaseMinimum password length:Seven charactersLockout duration:One dayLockout Threshold: Five failed attempts in 15 minutesWhich of the following adjustments would be the most appropriate for the service account?a. Disable account lockoutsb. Set the maximum password age to 15 daysc. Set the minimum password age to seven daysd. Increase password length to 18 characters

ansver
Answers: 2

Another question on Computers and Technology

question
Computers and Technology, 21.06.2019 16:10
Which is a benefit of peer-to-peer networking? easy to add or remove devices main server has a fast processor more reliable than a client/server network same software versions on all computers
Answers: 3
question
Computers and Technology, 23.06.2019 06:20
What is a point-in-time measurement of system performance?
Answers: 3
question
Computers and Technology, 23.06.2019 07:00
Why were most movies from the late 1890s until the early 1930s only filmed in black and white? there were only a few people who could afford the technology to produce color motion pictures back then. audiences did not want color motion pictures until later. the film used to make color motion pictures often overheated, which was a safety hazard, so it was generally not allowed. color films had to be hand-colored, frame by frame.
Answers: 3
question
Computers and Technology, 23.06.2019 15:00
1. which of the following statements are true about routers and routing on the internet. choose two answers. a. protocols ensure that a single path between two computers is established before sending packets over it. b. routers are hierarchical and the "root" router is responsible for communicating to sub-routers the best paths for them to route internet traffic. c. a packet traveling between two computers on the internet may be rerouted many times along the way or even lost or "dropped". d. routers act independently and route packets as they see fit.
Answers: 2
You know the right answer?
A security analyst is reviewing the password policy for a service account that is used for a critica...
Questions
question
Mathematics, 12.03.2021 19:20