A _________ strategy is one in which the system periodically runs its own password cracker to find guessable passwords. ?

Fill in the blank(s) with the appropriate word(s).

reactive password checking

Computer Science & Information Technology

You might also like to view...

The onscreen view in a database that is used to create or modify the design of a table is called ________ View

A) Data Source B) Design C) Field List D) Table Data

Computer Science & Information Technology

One of the goals of business intelligence is to _________.

A. ?present the results in an easy to understand manner B. educate the users about business statistics C. ensure the transaction data is properly stored D. use the most sophisticated techniques

Computer Science & Information Technology