a. What are reusable passwords? b. Why is password cracking over a network difficult to do? c. In what two ways can password-cracking programs be used? d. Which is safer for the cracker? Why?
a. What is the book’s recommended password policy for length and complexity? b. How can password-cracking programs be used to enforce password strength policy? c. Before you run a password-cracking program on your company’s computers to check for weak passwords, what should you do?
Already registered? Login
Not Account? Sign up
Enter your email address to reset your password
Back to Login? Click here