A report delivered to the Chief Information Security Officer (CISO) shows that some user credentials could be exfiltrated. The report also indicates that users tend to choose the same credentials on different systems and applications. Which of the following policies should the CISO use to prevent someone from using the exfiltrated credentials?
Ribeiro19
Highly Voted 1Â year, 8Â months agoPapee
1Â year, 6Â months agoSkymaster8182
6Â months, 1Â week agoSTODDY69
Highly Voted 8Â months, 3Â weeks agoshady23
Most Recent 1Â week, 2Â days agothea_smith
1Â week, 2Â days agoJackyCIT
2Â weeks, 2Â days agorussian
2Â weeks, 3Â days agoAspiringNerd
2Â weeks, 4Â days agoJustJess
1Â month, 3Â weeks agoJustJess
1Â month, 3Â weeks agoZiareKing
2Â months agoDrosk5
2Â months agoMarcelmikael
2Â months agoSareena13
2Â months agosubaie503
2Â months, 1Â week agoTrueKiwi
2Â months, 1Â week agothea_smith
2Â months, 3Â weeks agoGrahamtb
2Â months, 3Â weeks ago