Which of following actions should you take?

You receive an email stating that the company’s network administrators want to validate the complexity of login passwords used throughout the organization. They request that you provide the password in a reply email. Which of following actions should you take?

You receive an email stating that the company’s network administrators want to validate the complexity of login passwords used throughout the organization. They request that you provide the password in a reply email. Which of following actions should you take?

A.
Encrypt the reply and send the reply to the requestor.

B.
Deny the request by deleting the email.

C.
Send a reply message containing the password.

D.
Send a reply message with an encrypted signature attached.

Explanation:
You should never share your password to anyone. If the network administrators really need access to your password than they can probably change it themselves. Also there is built in tools in Windows that can make sure that certain complexity among the passwords is maintained.



Leave a Reply 0

Your email address will not be published. Required fields are marked *