PrepAway - Latest Free Exam Questions & Answers

Which of the following technical controls must be imple…

A security administrator must implement all requirements in the following corporate policy:
Passwords shall be protected against offline password brute force attacks. Passwords shall be protected against online password brute force attacks. Which of the
following technical controls must be implemented to enforce the corporate policy? (Select THREE).

PrepAway - Latest Free Exam Questions & Answers

A.
Account lockout

B.
Account expiration

C.
Screen locks

D.
Password complexity

E.
Minimum password lifetime

F.
Minimum password length

Explanation:
A brute force attack is a trial-and-error method used to obtain information such as a user password or personal identification number (PIN). In a brute force attack,
automated software is used to generate a large number of consecutive guesses as to the value of the desired data. Brute force attacks may be used by criminals to
crack encrypted data, or by security analysts to test an organization’s network security.
A brute force attack may also be referred to as brute force cracking. For example, a form of brute force attack known as a dictionary attack might try all the words
in a dictionary. Other forms of brute force attack might try commonly-used passwords or combinations of letters and numbers.
The best defense against brute force attacks strong passwords. The following password policies will ensure that users have strong (difficult to guess) passwords:
F: Minimum password length. This policy specifies the minimum number of characters a password should have. For example: a minimum password length of 8
characters is regarded as good security practice.
D: Password complexity determines what characters a password should include. For example, you could require a password to contain uppercase and lowercase
letters and numbers. This will ensure that passwords don’t consist of dictionary words which are easy to crack using brute force techniques.
A: Account lockout policy: This policy ensures that a user account is locked after a number of incorrect password entries. For example, you could specify that if a
wrong password is entered three times, the account will be locked for a period of time or indefinitely until the account is unlocked by an administrator.
Incorrect Answers:
B: Account expiration settings determine when an account will expire. This is usually a time or date. An account configured with an expiration date will not prevent
an attacker trying to brute force a password as the attacker could make as many attempts as he wants until the time or date of the account expiration. Therefore,
this answer is incorrect.
C: A screen lock will cause the screen of a computer or mobile device to lock after a period of inactivity. It is not used to prevent brute force attacks. Therefore, this
answer is incorrect.
E: Password history determines the number of previous passwords that cannot be used when a user changes his password. For example, a password history value
of 5 would disallow a user from changing his password to any of his previous 5 passwords. When a user is forced to change his password due to a maximum
password age period expiring, he could change his password to a previously used password. Or if a password history value of 5 is configured, the user could
change his password six times to cycle back round to the original password. This is where the minimum password age (minimum password lifetime) comes in. This
is the period that a password must be used for. For example, a minimum password age of 30 would determine that when a user changes his password, he must
continue to use the same password for at least 30 days. A minimum password age would not protect against brute force attacks. Therefore, this answer is
incorrect.

https://technet.microsoft.com/enus/library/cc757692%28v=ws.10%29.aspx#w2k3tr_sepol_accou_set_kuwh


Leave a Reply