Configuring passwords to meet the complexity requirements prevents which of the following?

a. Brute force attacks
b. Dictionary attacks
c. Hybrid attacks
d. Any password attack

ANS: B

Computer Science & Information Technology

You might also like to view...

Which of the following is NOT a true statement when using MLA style to format a research paper?

A) The first line of each paragraph is indented. B) Include a right-aligned header with your last name and page number. C) Lines are single-spaced. D) Margins are set to 1".

Computer Science & Information Technology

Match the following terms to their meanings:

I. Input mask II. Data validation III. 0 IV. 9 V. ! A. rules that help prevent individuals from entering invalid data B. field property that determines the data that can be entered C. causes the input mask to fill in from the left to right D. indicates an optional digit or space E. indicates a required digit

Computer Science & Information Technology