A technician needs to troubleshoot a user’s computer. The user leaves personal credentials
written on a piece of paper for the technician. Which of the following principles has the user
violated?
A.
Password expiration
B.
Password confidentiality
C.
Password complexity
D.
Password reuse