Which step will best help you resolve this problem?

A security breach has occurred in which a third party was able to obtain and misuse legitimate
authentication information. After investigation, you determined that the specific cause for the
breach was that end users have been placing their passwords underneath their keyboards. Which
step will best help you resolve this problem?

A security breach has occurred in which a third party was able to obtain and misuse legitimate
authentication information. After investigation, you determined that the specific cause for the
breach was that end users have been placing their passwords underneath their keyboards. Which
step will best help you resolve this problem?

A.
Discipline specific end users as object lessons to the rest of the staff and reset passwords on all
systems immediately.

B.
Change all passwords on the company servers immediately and inform end users that their
passwords will be changing on a regular basis.

C.
Set passwords to expire at specific intervals and establish mandatory continual training
sessions.

D.
Inform end users that their passwords will be changing on a regular basis and require more
complex passwords.



Leave a Reply 0

Your email address will not be published. Required fields are marked *