Which of the following methods or technologies is most likely to be used in order to mitigate brute force attacks?
Which of the following methods or technologies is most likely to be used in order to mitigate brute force attacks?
A . Account lockout policy
B. Automated security logging
C. Role-based access control
D. Secure password recovery
Answer: A
Explanation:
Reference: https://www.sciencedirect.com/topics/computer-science/account-lockout-policy#:~:text=Account%20lockout%20policies%20are%20used,twice%2C%20but%20not %20numerous%20times
Latest ITS-110 Dumps Valid Version with 100 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund
Subscribe
Login
0 Comments
Inline Feedbacks
View all comments