Which of the following can the security Administrator implement to mitigate the risk of an online password attack against users with weak passwords?
Which of the following is a BEST practice when dealing with user accounts that will only need to be active for a limited time period?
Which of the following policies would prevent contractors from having access to systems in the event a contractor has left?
Which of the following controls mitigates the risk of Matt, an attacker, gaining access to a company network by using a former employee’s credential?