Which of the following could the security administrator implement to reduce the risk associated with the finding?
Which of the following technical controls MUST be in place in order to promote the use of passphrases?
Which of the following works by implanting software on systems but delays execution until a specific set of conditions is met?