Cyber Monday 2024! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

CertNexus Exam ITS-110 Topic 2 Question 47 Discussion

Actual exam question for CertNexus's ITS-110 exam
Question #: 47
Topic #: 2
[All ITS-110 Questions]

Which of the following methods or technologies is most likely to be used in order to mitigate brute force attacks?

Show Suggested Answer Hide Answer
Suggested Answer: A

Contribute your Thoughts:

Galen
14 days ago
Role-based access control is a clever way to limit the damage a brute force attack can do. Restricts what the attacker can access.
upvoted 0 times
...
Olive
1 months ago
Automated security logging is great for tracking and investigating any suspicious activity. Definitely a valuable tool.
upvoted 0 times
...
Moon
1 months ago
Secure password recovery seems like a good option too. It could help prevent the attacker from gaining access even if they get the password.
upvoted 0 times
Ivory
23 hours ago
D) Secure password recovery
upvoted 0 times
...
Willard
4 days ago
C) Role-based access control
upvoted 0 times
...
Serina
21 days ago
B) Automated security logging
upvoted 0 times
...
Trinidad
23 days ago
A) Account lockout policy
upvoted 0 times
...
...
Yen
1 months ago
I agree with Margot. Account lockout policy can help prevent brute force attacks by locking out the account after multiple failed login attempts.
upvoted 0 times
...
Margot
2 months ago
I think A) Account lockout policy is the best option.
upvoted 0 times
...
Jacquline
2 months ago
I think the account lockout policy is the best way to mitigate brute force attacks. It'll lock out the attacker after a certain number of failed attempts.
upvoted 0 times
Vince
8 days ago
Secure password recovery can help users regain access to their accounts securely.
upvoted 0 times
...
Felix
14 days ago
Role-based access control is important to limit access to sensitive information.
upvoted 0 times
...
Rasheeda
19 days ago
Automated security logging can also help track and identify potential attackers.
upvoted 0 times
...
Chun
21 days ago
C) Role-based access control is important for limiting access to sensitive information.
upvoted 0 times
...
Brande
25 days ago
B) Automated security logging can also help in detecting and responding to such attacks.
upvoted 0 times
...
Tammara
1 months ago
I agree, the account lockout policy is a good way to stop brute force attacks.
upvoted 0 times
...
Dorthy
1 months ago
A) Account lockout policy is definitely effective in preventing brute force attacks.
upvoted 0 times
...
...

Save Cancel
az-700  pass4success  az-104  200-301  200-201  cissp  350-401  350-201  350-501  350-601  350-801  350-901  az-720  az-305  pl-300  

Warning: Cannot modify header information - headers already sent by (output started at /pass.php:70) in /pass.php on line 77