The security manager at Crucial Technologies wants to help mitigate the possibility of someone being able to access another user’s account by gaining access to the user’s password. What logical security technology should be implemented to satisfy this requirement?

  • WPA2
  • MFA
  • Encryption
  • Password complexity rules

Your Score:
Operating Systems
Security
Software Troubleshooting
Operational Procedures
CompTIA A+ 220-1102
  • Operating Systems
  • Security
    • This question is filed here
  • Software Troubleshooting
  • Operational Procedures