A technician needs to troubleshoot a user’s computer. The user leaves personal credentials written on a piece of paper for the technician. Which of the following principles has the user violated?
A. Password confidentiality
B. Password complexity
C. Password reuse
D. Password expiration