To ensure compliance with a security policy requiring that passwords be a combination of letters and numbers, an IS auditor should recommend that:
An information security policy stating that ‘the display of passwords must be masked or suppressed’ addresses which of the following attack methods?