Relacionar Columnas 14.1.2 Workstation Security FaVersión en línea Testout por Mr. B 1 authentication requires users to fulfill any two of these requirements. 2 Passwords should consist of a combination of upper- and lower-case letters, numbers, and special characters (e.g.,!@#$%^&*?). 3 Hackers can use a list of compromised passwords to perform a password cracking attack 4 Always set a password to prevent unauthorized access to these settings. 5 Increasing the number of characters in a password exponentially increases the time it takes to brute force a password. 6 A hacker can also use this information to guess the answers to password reset questions and allow a hacker to reset a password. 7 A better policy is to require stronger passwords and not force users to reset at specific intervals. Common passwords Reset interval BIOS/UEFI Password Personal information Password length Multi-factor authentication Password composition