1. Which one of the following is not considered good practice when managing passwords?
2. What is the term used to describe a type of attack where a computer works methodically through all possible passwords?
3. Which one of the following should always be avoided?
4. All but one of the following are examples of two-factor authentication. Which of these is the odd one out, because it does not involve two factors?
Thanks dude, that's extremely good information, cheers.
ReplyDelete:)
ReplyDelete