Which of the following should the security administrator implement to mitigate password cracking attacks?
Which of the following is BEST suited when assigning user rights to individuals in the sales department?
Which of the following account management techniques should be undertaken regularly to ensure least privilege principles?