Which of the following is most commonly a local security policy?
a. Password length
b. Use a password to log in
c. Soft Power
d. RAID
Answer: a. Password length
Computer Science & Information Technology
You might also like to view...
What are the three parts of the EIA/TIA 568-B standard?
What will be an ideal response?
Computer Science & Information Technology
This defines how characters relate to each other when they are compared.
a. digitizing b. binary sequence c. collating sequence d. information representation
Computer Science & Information Technology