When used alone, which of the following controls mitigates the risk of Sara, an attacker, launching an online brute force password attack?
A. Account expiration
B. Account lockout
C. Password complexity
D. Password length
Ans: B. Account lockout
Computer Science & Information Technology
You might also like to view...
A(n) ________ is a grouping of tweets from selected Twitter users
Fill in the blank(s) with correct word
Computer Science & Information Technology
?A(n) _____ is a characteristic or feature that must be included in an information system to satisfy business needs and be acceptable to users.
A. ?system requirement B. ?property C. ?questionnaire D. ?object
Computer Science & Information Technology
What are the six phases of view modeling?
What will be an ideal response?
Computer Science & Information Technology
The most important floating-point representation is defined in IEEE Standard _________, adopted in 1985 and revised in 2008.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology