Which of the following should the consultant recommend to the company, in order to mitigate the risk of employees credentials being captured in the same manner in the future?
Which of the following will once defined, be the requirement for restoration of these systems within a certain period of time?
Which of the following password attacks involves attempting all kinds of keystroke combinations on the keyboard with the intention to gain administrative access?
Which of the following is the BEST technical control that could be implemented to reduce the amount of easily “crackable” passwords in use?