Which of Ihe following would mitigate the issue?

Multiple business accounts were compromised a few days after a public website had its credentials database leaked on the internet No business emails were Identified in the breach, but the security team thinks that the list of passwords exposed was later used to compromise business accounls.

Which of Ihe following would mitigate the issue?
A . Complexity requirements
B. Password history
C. Acceptable use policy
D. Shared accounts

Answer: C

Latest SY0-601 Dumps Valid Version with 396 Q&As

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments