A security breach has occurred in which a third party was able to obtain and misuse legitimate authentication information. After investigation, you determined that the specific cause for the breach was that end users have been placing their passwords underneath their keyboards. Which step will best help you resolve this problem?
A) Discipline specific end users as object lessons to the rest of the staff and reset passwords on all systems immediately.
B) Change all passwords on the company servers immediately and inform end users that their passwords will be changing on a regular basis.
C) Set passwords to expire at specific intervals and establish mandatory continual training sessions.
D) Inform end users that their passwords will be changing on a regular basis and require more complex passwords.
Correct Answer:
Verified
Q3: What is the primary drawback of using
Q4: A new server has been placed on
Q5: A CGI application on the company's Web
Q6: A security breach has occurred involving the
Q7: Which of the following is a typical
Q9: You have implemented a version of the
Q10: Which of the following is the most
Q11: A disgruntled employee has discovered that the
Q12: You are using a PKI solution that
Q13: The most popular types of proxy-oriented firewalls
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents