Which of the following methods or technologies is most likely to be used in order to mitigate brute force attacks?

Which of the following methods or technologies is most likely to be used in order to mitigate brute force attacks?
A . Account lockout policy
B. Automated security logging
C. Role-based access control
D. Secure password recovery

Answer: A

Explanation:

Reference: https://www.sciencedirect.com/topics/computer-science/account-lockout-policy#:~:text=Account%20lockout%20policies%20are%20used,twice%2C%20but%20not %20numerous%20times

Latest ITS-110 Dumps Valid Version with 100 Q&As

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments