Additionally, which of the following can the administrator implement to reduce the risk of data leakage?
Which of the following is seen as non-secure based on its ability to only store seven uppercase characters of data making it susceptible to brute force attacks?