CCSP SECUR FAQ : Attack Threats Defined and Detailed Q1. Your boss insists that it is fine to use his wife’s name as his password, despite the fact that your security policy states that this is not a sufficient password. What weaknesses are revealed? A. This shows a lack of an effective security policy (policy weakness). B. This shows a technology weakness. C. This shows a … [Read more...]