COMPUTER THREATS SECURITY
COMPUTER SECURITY POLICIES EXAMPLES
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
Brute force attacks
|
|
Users from sharing passwords
|
|
Social engineering
|
|
Passwords from being reused immediately
|
Detailed explanation-1: -The Enforce password history policy setting determines the number of unique new passwords that must be associated with a user account before an old password can be reused. Password reuse is an important concern in any organization. Many users want to reuse the same password for their account over a long period of time.
Detailed explanation-2: -Description. “Password history:” Number of unique passwords that must be used before an user can re-use his old password.
Detailed explanation-3: -The “Enforce password history” option is used to prevent users from reusing old passwords. This makes the system more secure; a user needs to use a new password (one that has never been used before) each time they change the password. Valid values for this are between 0 and 24.
Detailed explanation-4: -Computer ConfigurationSettingsSettingsPoliciesPolicypassword history.
Detailed explanation-5: -The Maximum password age policy setting determines the period of time (in days) that a password can be used before the system requires the user to change it.