New Year Sale ! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

CertNexus Exam ITS-110 Topic 2 Question 47 Discussion

Actual exam question for CertNexus's ITS-110 exam
Question #: 47
Topic #: 2
[All ITS-110 Questions]

Which of the following methods or technologies is most likely to be used in order to mitigate brute force attacks?

Show Suggested Answer Hide Answer
Suggested Answer: A

Contribute your Thoughts:

Galen
28 days ago
Role-based access control is a clever way to limit the damage a brute force attack can do. Restricts what the attacker can access.
upvoted 0 times
...
Olive
2 months ago
Automated security logging is great for tracking and investigating any suspicious activity. Definitely a valuable tool.
upvoted 0 times
...
Moon
2 months ago
Secure password recovery seems like a good option too. It could help prevent the attacker from gaining access even if they get the password.
upvoted 0 times
Ashanti
12 days ago
Role-based access control can also help limit the damage of a brute force attack.
upvoted 0 times
...
Harrison
13 days ago
I agree, having a secure password recovery option is crucial in preventing unauthorized access.
upvoted 0 times
...
Vanesa
13 days ago
Secure password recovery could definitely add an extra layer of security.
upvoted 0 times
...
Ivory
15 days ago
D) Secure password recovery
upvoted 0 times
...
Willard
18 days ago
C) Role-based access control
upvoted 0 times
...
Serina
1 months ago
B) Automated security logging
upvoted 0 times
...
Trinidad
1 months ago
A) Account lockout policy
upvoted 0 times
...
...
Yen
2 months ago
I agree with Margot. Account lockout policy can help prevent brute force attacks by locking out the account after multiple failed login attempts.
upvoted 0 times
...
Margot
2 months ago
I think A) Account lockout policy is the best option.
upvoted 0 times
...
Jacquline
2 months ago
I think the account lockout policy is the best way to mitigate brute force attacks. It'll lock out the attacker after a certain number of failed attempts.
upvoted 0 times
Vince
22 days ago
Secure password recovery can help users regain access to their accounts securely.
upvoted 0 times
...
Felix
28 days ago
Role-based access control is important to limit access to sensitive information.
upvoted 0 times
...
Rasheeda
1 months ago
Automated security logging can also help track and identify potential attackers.
upvoted 0 times
...
Chun
1 months ago
C) Role-based access control is important for limiting access to sensitive information.
upvoted 0 times
...
Brande
1 months ago
B) Automated security logging can also help in detecting and responding to such attacks.
upvoted 0 times
...
Tammara
2 months ago
I agree, the account lockout policy is a good way to stop brute force attacks.
upvoted 0 times
...
Dorthy
2 months ago
A) Account lockout policy is definitely effective in preventing brute force attacks.
upvoted 0 times
...
...

Save Cancel