The weakest aspect of password-based security is
a. the encryption technique used
b. the type of key chosen
c. the user’s management of their password information
d. the algorithm used
c. the user’s management of their password information
Computer Science & Information Technology
You might also like to view...
When considering the bottom line cost between a brand name and a no name computer, the additional purchase of a(n) ________ to protect the hardware should be taken into account
Fill in the blank(s) with correct word
Computer Science & Information Technology
________ forms can be created by using either the Page Break tool or the Tab Control tool
Fill in the blank(s) with correct word
Computer Science & Information Technology