A report delivered to the Chief Information Security Officer (CISO) shows that some user credentials could be exfiltrated. The report also indicates that users tend to choose the same credentials on different systems and applications. Which of the following policies should the CISO use to prevent someone from using the exfiltrated credentials?
Ribeiro19
Highly Voted 2Â years, 8Â months agoPapee
2Â years, 6Â months agoSkymaster8182
7Â months, 3Â weeks agoSTODDY69
Highly Voted 7Â months, 3Â weeks agoqulis
Most Recent 7Â months, 3Â weeks agorodwave
7Â months, 3Â weeks agoProctored_Expert
7Â months, 3Â weeks agoprincajen
7Â months, 3Â weeks agoApplebeesWaiter1122
7Â months, 3Â weeks agoSlySyrup
7Â months, 3Â weeks agoProtract8593
7Â months, 3Â weeks agoTheFivePips
7Â months, 3Â weeks agoDogeo
7Â months, 3Â weeks agoRobDoc
7Â months, 3Â weeks agozeeshanali1993
7Â months, 3Â weeks agoGrahamtb
7Â months, 3Â weeks agoRainSec
7Â months, 3Â weeks agoagfencer
7Â months, 3Â weeks agoZiareKing
7Â months, 3Â weeks ago