Cyber Monday 2024! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

CertNexus Exam ITS-110 Topic 1 Question 29 Discussion

Actual exam question for CertNexus's ITS-110 exam
Question #: 29
Topic #: 1
[All ITS-110 Questions]

Which of the following methods or technologies is most likely to be used in order to mitigate brute force attacks?

Show Suggested Answer Hide Answer
Suggested Answer: A

Contribute your Thoughts:

Matthew
6 months ago
Candidate 6: In my opinion, using a combination of these methods would provide the best protection against brute force attacks.
upvoted 0 times
...
Fletcher
6 months ago
Candidate 5: I see your point, but secure password recovery can also help prevent brute force attacks by making sure passwords are strong and secure.
upvoted 0 times
...
Alesia
6 months ago
That's true, Automated security logging can provide visibility into suspicious login activities.
upvoted 0 times
...
Avery
6 months ago
But what about option B) Automated security logging? It can help track and identify potential brute force attacks.
upvoted 0 times
...
Wenona
6 months ago
Candidate 4: I believe role-based access control is more effective, as it restricts access based on user roles.
upvoted 0 times
...
Ahmed
6 months ago
I agree with With account lockout policy, we can prevent multiple incorrect login attempts.
upvoted 0 times
...
Shannon
6 months ago
Candidate 3: But what about automated security logging? Wouldn't that help track unauthorized login attempts?
upvoted 0 times
...
Alesia
6 months ago
I think the most effective method would be A) Account lockout policy.
upvoted 0 times
...
Latonia
7 months ago
Candidate 2: I agree, if a hacker tries multiple times to log in, the account will be locked out.
upvoted 0 times
...
Bea
7 months ago
Candidate 1: I think the best method to mitigate brute force attacks is account lockout policy.
upvoted 0 times
...
Desiree
8 months ago
I'm still not convinced. Aren't there issues with password recovery systems being abused by attackers too? I think the best all-around solution is the account lockout policy. It may be a bit inconvenient, but it's the most robust defense against brute forcing.
upvoted 0 times
Felix
6 months ago
I don't think it's as effective as account lockout policy.
upvoted 0 times
...
Leonard
6 months ago
But what about role-based access control?
upvoted 0 times
...
Viola
6 months ago
I agree. It can prevent repeated login attempts.
upvoted 0 times
...
Eun
7 months ago
I think account lockout policy is the best option.
upvoted 0 times
...
...
Barrett
8 months ago
Haha, 'easy peasy'? What are you, five years old? But you know, I kind of like that idea. A good password recovery system could really foil those brute force attacks. I'm going with D as well.
upvoted 0 times
...
Pansy
8 months ago
You guys are overthinking this. The answer is clearly D - secure password recovery. If you have a strong password reset process, it doesn't matter if someone tries to brute force your account, they won't be able to get in anyway. Easy peasy!
upvoted 0 times
...
Gayla
8 months ago
Hmm, I don't know. Logging attacks is good, but it doesn't actually stop them. I'm leaning towards C - role-based access control. If you limit what users can do based on their role, it makes it a lot harder for attackers to gain meaningful access, even if they guess a password.
upvoted 0 times
...
Trina
8 months ago
I'm not sure, the account lockout policy seems a bit heavy-handed to me. What if I accidentally get locked out of my own account? I was thinking B - automated security logging might be a better option. That way you can at least track the attack and respond accordingly.
upvoted 0 times
...
Alex
8 months ago
Ugh, brute force attacks are the worst! I hate when hackers try to guess my password over and over again. This question is going to be tough, but I think the answer is A - account lockout policy. That's the best way to stop those persistent brute force attempts, right?
upvoted 0 times
...

Save Cancel
az-700  pass4success  az-104  200-301  200-201  cissp  350-401  350-201  350-501  350-601  350-801  350-901  az-720  az-305  pl-300  

Warning: Cannot modify header information - headers already sent by (output started at /pass.php:70) in /pass.php on line 77