77) What is the role of users in information security?
78) Explain the characteristics of a strong password.
79) How can a strong password be made memorable?
80) Explain the necessary password etiquette to be followed by the users of an information system.
Already registered? Login
Not Account? Sign up
Enter your email address to reset your password
Back to Login? Click here