After running an online password cracking tool, an attacker recovers the following password:
gh ;j SKSTOi;618&
Based on the above information, which of the following technical controls have been implemented? (Choose two.)
A . Complexity
B . Encryption
C . Hashing
D . Length
E . Salting
F . Stretching
Answer: AD