Which of the following processes identifies an operating system based on its response to different types of network traffic quizlet?

A user named Bob Smith has been assigned a new desktop workstation to complete his day-to-day work.
When provisioning Bob's user account in your organization's domain, you assigned an account name of BSmith with an initial password of bw2Fs3d.
On first login, Bob is prompted to change his password. He changes it to the name of his dog, Fido.
What should you do to increase the security of Bob's account? (Select two.)

-Use a stronger initial password when creating user accounts.

-Train users not to use passwords that are easy to guess.

-Do not allow users to change their own passwords.

-Require him to use the initial password, which meets the complexity requirements.

-Configure user account names that are not easy to guess.

-Use Group Policy to require strong passwords on user accounts.