61) Explain the difference and the relationship between information technology (IT) and information systems (IS). 62) Security systems ultimately depend on the behavior of their ________. A) users...





61) Explain the difference and the relationship between information technology (IT) and information systems (IS).



62) Security systems ultimately depend on the behavior of their ________.



A) users



B) programmers



C) hardware components



D) database structures



63) Which of the following requirements should a password fulfill in order to be considered strong?



A) It should have five characters at the most.



B) It should contain a complete dictionary word.



C) It should not contain many special characters.



D) It should not contain the user name or company name.



64) A user has created a password that meets all the criteria for a strong password. What is a potential drawback of such a password?



A) It will be difficult to remember.



B) It will be very short.



C) It can be easily guessed.



D) It will create IP address conflicts in networks.



65) A password is said to be weak if it contains ________.



A) a complete dictionary word



B) both upper- and lowercase letters



C) the numbers 9 and 3



D) three special characters



66) Which of the following passwords is the weakest?



A) B33rmu9



B) Qw37^T1bb?as



C) 3B47qq57bdE



D) As60$T1dd?dc







May 15, 2022
SOLUTION.PDF

Get Answer To This Question

Submit New Assignment

Copy and Paste Your Assignment Here