List of questions
Related questions
Question 183 - CISSP discussion
An auditor carrying out a compliance audit requests passwords that are encrypted in the system to verify that the passwords are compliant with policy. Which of the following is the BEST response to the auditor?
A.
Provide the encrypted passwords and analysis tools to the auditor for analysis.
B.
Analyze the encrypted passwords for the auditor and show them the results.
C.
Demonstrate that non-compliant passwords cannot be created in the system.
D.
Demonstrate that non-compliant passwords cannot be encrypted in the system.
Your answer:
0 comments
Sorted by
Leave a comment first