Strong passwords usually combine upper- and lower-case letters, numbers and special characters in a non-obvious pattern. They should not be simple dictionary words or easily guessable sequences. The password in this option contains mixed characters and is longer than trivial strings, making it harder for attackers to crack through simple guessing. Therefore, it better reflects ICT security guidelines.
Option A:
This option uses a common word followed by a simple numeric sequence and is widely known as a weak example. Attackers often try such combinations first during brute-force or dictionary attacks. Hence, it does not meet strong password criteria.
Option B:
This option combines uppercase and lowercase letters with numbers and special symbols in a more complex structure. It is not a simple dictionary word and includes varying character types. Such complexity enhances resistance to guessing and automated attacks, aligning with recommended ICT practices.
Option C:
This option is very short and composed of sequential letters, making it easy to guess or brute-force. Short and predictable passwords significantly weaken account security. Thus, it is not suitable as a strong password.
Option D:
This option uses repeated digits and is extremely weak. Attackers often try such patterns early because they are common user choices. Therefore, it fails to follow any strong password guideline.
Comment Your Answer
Please login to comment your answer.
Sign In
Sign Up
Answers commented by others
No answers commented yet. Be the first to comment!