At a large healthcare organization, the Security Operations Center (SOC) detects a surge of failed login attempts on employee accounts, indicating a possible brute-force attack. To contain the threat, the team quickly takes action to prevent unauthorized access. However, they also need to implement a security measure that strengthens account protection beyond just stopping the current attack, reducing the risk of similar incidents in the future. During the Containment Phase, which action would best enhance long-term account security against brute-force attacks?
MFA is the most effective long-term control among the options because it directly reduces the attacker's ability to succeed even when passwords are guessed, reused, or stolen. Brute-force and credential stuffing attacks exploit the single-factor nature of passwords; MFA adds an additional verification factor (authenticator app prompt, FIDO2 key, certificate-based auth), making account takeover significantly harder. From a containment standpoint, blocking IPs and enabling lockout can reduce immediate attack volume, but attackers commonly rotate IPs, use botnets, or target many accounts in parallel, which can also cause operational impact via account lockouts (denial of service against users). Cross-verifying false positives is important for accuracy, but it does not strengthen security. Notifying users can help awareness but is not a technical control. In SOC operations, the best practice is layered containment: immediate throttling/blocks and lockout tuning for the active attack, followed by durable hardening controls. MFA is the durable hardening step that meaningfully reduces future brute-force success rates and complements conditional access policies (geo/time/device risk) and stronger password protections.
In Which option best incident handling and response stages, the root cause of the incident must be found from the forensic results?
Which of the following event detection techniques uses User and Entity Behavior Analytics (UEBA)?
A type of threat intelligent that find out the information about the attacker by misleading them is known as
.

Which of the following attacks causes sudden changes in file extensions or increase in file renames at rapid speed?
Giovanna
4 days agoGerald
12 days agoSommer
20 days agoSueann
27 days agoRenea
1 month agoNichelle
1 month agoVincenza
2 months agoSantos
2 months agoCammy
2 months agoYuette
2 months agoTruman
3 months agoAlbina
3 months agoMarilynn
3 months agoZachary
3 months agoMona
4 months agoWillodean
4 months agoLeoma
4 months agoBlair
4 months agoTaryn
5 months agoJulene
5 months agoNovella
5 months agoClay
5 months agoAngelyn
6 months agoChandra
6 months agoJennifer
6 months agoOcie
6 months agoFelix
6 months agoLeonora
8 months agoBettina
8 months agoLavelle
9 months agoDarrel
10 months agoKattie
10 months agoTalia
11 months agoMendy
12 months agoDevorah
1 year agoRoosevelt
1 year agoNilsa
1 year agoBeckie
1 year agoLuisa
1 year agoDolores
1 year agoLouvenia
1 year agoYoko
1 year agoFletcher
1 year agoTeri
1 year agoGerry
1 year agoLenora
1 year agoAshlyn
1 year agoLeota
1 year agoMarva
1 year agoLouvenia
1 year agoHolley
1 year agoMonte
1 year agoCarmelina
1 year agoBeatriz
1 year agoLai
1 year agoAvery
1 year agoJames
1 year agoFlo
1 year agoHelga
2 years agoLenita
2 years agoWade
2 years agoAsha
2 years agoWilliam
2 years agoCatherin
2 years ago