Identify the sample of system components observed.
For each sampled system component:
i. Describe the system configuration settings inspected.
ii. Identify the number of previously used passwords that cannot be the same as a new password, as observed in the system configuration settings.