Answer:
(a) Weak passwords
Step-by-step explanation:
Typically, a password is weak if it is easily discovered by all persons including unauthorized users. When passwords to a network are weak, the network is vulnerable to unauthorized access and may permit access to proprietary code, accounting files and other sensitive documents in the network.
Examples of weak passwords are;
i. those generated from the name of a user.
ii. those generated for a user by default.
iii. those generated from words from dictionary or other similar materials.
iv. those that don't include a combination of letters and numbers and even symbols.
v. those that are short in length e.g less than 8 characters.