New Year Special - 75% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ac75sure

Some sensitive computer systems are particularly attractive to cyber criminals.

Some sensitive computer systems are particularly attractive to cyber criminals. Passwords may be used as one element of restricting access to legitimate users, but the password systems should be designed with great care.

Which of the following methods would enhance a password access system?

A.

The use of a two level system, a primary password plus questions correctly answered from set of queries, logged at system set up time.

B.

The use of drop down menus, using screen coordinates rather than transmitting keystrokes over a communication link.

C.

The logging and reporting of failed password attempts.

D.

The password should be typed quickly.

E.

The use of family members names, known only to the individual and not known by colleagues.

F.

The use of a sequence of passwords, using upper and lower case with numbers, easy to remember but regularly changed for example; November 11, December12, January01.

P3 PDF/Engine
  • Printable Format
  • Value of Money
  • 100% Pass Assurance
  • Verified Answers
  • Researched by Industry Experts
  • Based on Real Exams Scenarios
  • 100% Real Questions
buy now P3 pdf
Get 75% Discount on All Products, Use Coupon: "ac75sure"