A report delivered to the Chief Information Security Officer (CISO) shows that some user credentials could be exfiltrated. The report also indicates that users tend to choose the same credentials on different systems and applications. Which of the following policies should the CISO use to prevent someone from using the exfiltrated credentials?
Ribeiro19
Highly Voted 2Â years, 11Â months agoPapee
2Â years, 9Â months agoSkymaster8182
10Â months, 2Â weeks agoSTODDY69
Highly Voted 10Â months, 2Â weeks agoqulis
Most Recent 10Â months, 2Â weeks agorodwave
10Â months, 2Â weeks agoProctored_Expert
10Â months, 2Â weeks agoprincajen
10Â months, 2Â weeks agoApplebeesWaiter1122
10Â months, 2Â weeks agoSlySyrup
10Â months, 2Â weeks agoProtract8593
10Â months, 2Â weeks agoTheFivePips
10Â months, 2Â weeks agoDogeo
10Â months, 2Â weeks agoRobDoc
10Â months, 2Â weeks agozeeshanali1993
10Â months, 2Â weeks agoGrahamtb
10Â months, 2Â weeks agoRainSec
10Â months, 2Â weeks agoagfencer
10Â months, 2Â weeks agoZiareKing
10Â months, 2Â weeks ago