61) Explain the difference and the relationship between information technology (IT) and information systems (IS).
62) Security systems ultimately depend on the behavior of their ________.
A) users
B) programmers
C) hardware components
D) database structures
63) Which of the following requirements should a password fulfill in order to be considered strong?
A) It should have five characters at the most.
B) It should contain a complete dictionary word.
C) It should not contain many special characters.
D) It should not contain the user name or company name.
64) A user has created a password that meets all the criteria for a strong password. What is a potential drawback of such a password?
A) It will be difficult to remember.
B) It will be very short.
C) It can be easily guessed.
D) It will create IP address conflicts in networks.
65) A password is said to be weak if it contains ________.
A) a complete dictionary word
B) both upper- and lowercase letters
C) the numbers 9 and 3
D) three special characters
66) Which of the following passwords is the weakest?
A) B33rmu9
B) Qw37^T1bb?as
C) 3B47qq57bdE
D) As60$T1dd?dc