The weakest aspect of password-based security is

a. the encryption technique used
b. the type of key chosen
c. the user’s management of their password information
d. the algorithm used

c. the user’s management of their password information

Computer Science & Information Technology

You might also like to view...

When considering the bottom line cost between a brand name and a no name computer, the additional purchase of a(n) ________ to protect the hardware should be taken into account

Fill in the blank(s) with correct word

Computer Science & Information Technology

________ forms can be created by using either the Page Break tool or the Tab Control tool

Fill in the blank(s) with correct word

Computer Science & Information Technology