Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

CertNexus Exam ITS-110 Topic 2 Question 47 Discussion

Actual exam question for CertNexus's ITS-110 exam
Question #: 47
Topic #: 2
[All ITS-110 Questions]

Which of the following methods or technologies is most likely to be used in order to mitigate brute force attacks?

Show Suggested Answer Hide Answer
Suggested Answer: A

Contribute your Thoughts:

Galen
3 months ago
Role-based access control is a clever way to limit the damage a brute force attack can do. Restricts what the attacker can access.
upvoted 0 times
Claribel
2 months ago
A) Account lockout policy can also help prevent brute force attacks by locking out the attacker after multiple failed attempts.
upvoted 0 times
...
Beckie
2 months ago
C) Role-based access control is definitely the best option. It adds an extra layer of security.
upvoted 0 times
...
Della
2 months ago
Role-based access control is a clever way to limit the damage a brute force attack can do. Restricts what the attacker can access.
upvoted 0 times
...
Maryanne
2 months ago
D) Secure password recovery
upvoted 0 times
...
Marshall
2 months ago
C) Role-based access control
upvoted 0 times
...
Queen
2 months ago
B) Automated security logging
upvoted 0 times
...
Lorean
2 months ago
A) Account lockout policy
upvoted 0 times
...
...
Olive
4 months ago
Automated security logging is great for tracking and investigating any suspicious activity. Definitely a valuable tool.
upvoted 0 times
...
Moon
4 months ago
Secure password recovery seems like a good option too. It could help prevent the attacker from gaining access even if they get the password.
upvoted 0 times
Ashanti
2 months ago
Role-based access control can also help limit the damage of a brute force attack.
upvoted 0 times
...
Harrison
2 months ago
I agree, having a secure password recovery option is crucial in preventing unauthorized access.
upvoted 0 times
...
Vanesa
2 months ago
Secure password recovery could definitely add an extra layer of security.
upvoted 0 times
...
Ivory
3 months ago
D) Secure password recovery
upvoted 0 times
...
Willard
3 months ago
C) Role-based access control
upvoted 0 times
...
Serina
3 months ago
B) Automated security logging
upvoted 0 times
...
Trinidad
3 months ago
A) Account lockout policy
upvoted 0 times
...
...
Yen
4 months ago
I agree with Margot. Account lockout policy can help prevent brute force attacks by locking out the account after multiple failed login attempts.
upvoted 0 times
...
Margot
4 months ago
I think A) Account lockout policy is the best option.
upvoted 0 times
...
Jacquline
4 months ago
I think the account lockout policy is the best way to mitigate brute force attacks. It'll lock out the attacker after a certain number of failed attempts.
upvoted 0 times
Vince
3 months ago
Secure password recovery can help users regain access to their accounts securely.
upvoted 0 times
...
Felix
3 months ago
Role-based access control is important to limit access to sensitive information.
upvoted 0 times
...
Rasheeda
3 months ago
Automated security logging can also help track and identify potential attackers.
upvoted 0 times
...
Chun
3 months ago
C) Role-based access control is important for limiting access to sensitive information.
upvoted 0 times
...
Brande
3 months ago
B) Automated security logging can also help in detecting and responding to such attacks.
upvoted 0 times
...
Tammara
4 months ago
I agree, the account lockout policy is a good way to stop brute force attacks.
upvoted 0 times
...
Dorthy
4 months ago
A) Account lockout policy is definitely effective in preventing brute force attacks.
upvoted 0 times
...
...

Save Cancel