subject

A security analyst is reviewing the password policy for a service account that is used for a critical network service. The password policy for this account is as follows:Enforce password history: Three passwords rememberedMaximum password age:30 daysMinimum password age:Zero daysComplexity requirements: At least one special character, one uppercaseMinimum password length:Seven charactersLockout duration:One dayLockout Threshold: Five failed attempts in 15 minutesWhich of the following adjustments would be the most appropriate for the service account?a. Disable account lockoutsb. Set the maximum password age to 15 daysc. Set the minimum password age to seven daysd. Increase password length to 18 characters

ansver
Answers: 2

Another question on Computers and Technology

question
Computers and Technology, 21.06.2019 18:30
Ayear in the modern gregorian calendar consists of 365 days. in reality, the earth takes longer to rotate around the sun. to account for the difference in time, every 4 years, a leap year takes place. a leap year is when a year has 366 days: an extra day, february 29th. the requirements for a given year to be a leap year are: the year must be divisible by 4if the year is a century year (1700, 1800, the year must be evenly divisible by 400some example leap years are 1600, 1712, and 2016.write a program that takes in a year and determines whether that year is a leap year.ex: if the input is 1712, the output is: 1712 is a leap year.ex: if the input is 1913, the output is: 1913 is not a leap year.
Answers: 2
question
Computers and Technology, 22.06.2019 00:00
Ahorse is how much percent more powerful than a pony
Answers: 1
question
Computers and Technology, 22.06.2019 11:00
What are two of the most common reasons that peolpe who need mental health care do not access it?
Answers: 1
question
Computers and Technology, 22.06.2019 13:30
Asoftware company hired ray, a college graduate to work in their development team. ray is assigned to work in the coding phase of a project. what happens during the coding phase of a software development project? a. the customer receives a working model of the software. b. developers convert the program design into code. c. developers gather requirements directly from the stakeholders. d. testing teams check the product for quality.
Answers: 1
You know the right answer?
A security analyst is reviewing the password policy for a service account that is used for a critica...
Questions
Questions on the website: 13722359