When used alone, which of the following controls mitigates the risk of Sara, an attacker, launching an online brute force password attack?

A. Account expiration
B. Account lockout
C. Password complexity
D. Password length


Ans: B. Account lockout

Computer Science & Information Technology

You might also like to view...

A(n) ________ is a grouping of tweets from selected Twitter users

Fill in the blank(s) with correct word

Computer Science & Information Technology

?A(n) _____ is a characteristic or feature that must be included in an information system to satisfy business needs and be acceptable to users.

A. ?system requirement B. ?property C. ?questionnaire D. ?object

Computer Science & Information Technology

What are the six phases of view modeling?

What will be an ideal response?

Computer Science & Information Technology

The most important floating-point representation is defined in IEEE Standard _________, adopted in 1985 and revised in 2008.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology