Which of the following is most commonly a local security policy?

a. Password length
b. Use a password to log in
c. Soft Power
d. RAID

Answer: a. Password length

Computer Science & Information Technology

You might also like to view...

What are the three parts of the EIA/TIA 568-B standard?

What will be an ideal response?

Computer Science & Information Technology

This defines how characters relate to each other when they are compared.

a. digitizing b. binary sequence c. collating sequence d. information representation

Computer Science & Information Technology