Ann, a user, wants to ensure that if her credentials are compromised, they cannot be used to access all of her
logins or accounts. Which of the following best practices should she implement?
A. Password history
B. Password length
C. Password reuse
D. Password complexity
logins or accounts. Which of the following best practices should she implement?
A. Password history
B. Password length
C. Password reuse
D. Password complexity