Which of the following is the BEST approach to implement this process?
A small company has a website that provides online customer support. The company requires an account
recovery process so that customers who forget their passwords can regain access.
Which of the following is the BEST approach to implement this process?
Which of the following is the BEST recovery strategy?
A user has forgotten their account password. Which of the following is the BEST recovery strategy?
Which of the following is a BEST practice when dealing with user accounts that will only need to be active for
Which of the following is a BEST practice when dealing with user accounts that will only need to be active
for a limited time period?
Which of the following policies would prevent contractors from having access to systems in the event a contrac
ABC company has a lot of contractors working for them. The provisioning team does not always get
notified that a contractor has left the company. Which of the following policies would prevent contractors
from having access to systems in the event a contractor has left?
Which of the following controls mitigates the risk of Matt, an attacker, gaining access to a company network b
Which of the following controls mitigates the risk of Matt, an attacker, gaining access to a company
network by using a former employee’s credential?
Which of the following security benefits would be gained by disabling a terminated user account rather than de
Which of the following security benefits would be gained by disabling a terminated user account rather
than deleting it?
Which of the following should be performed?
During an audit, the security administrator discovers that there are several users that are no longer
employed with the company but still have active user accounts. Which of the following should be
performed?
Which of the following security controls is the hacker exploiting?
A hacker has discovered a simple way to disrupt business for the day in a small company which relies on
staff working remotely. In a matter of minutes the hacker was able to deny remotely working staff access
to company systems with a script. Which of the following security controls is the hacker exploiting?
which of the following attacks?
Account lockout is a mitigation strategy used by Jane, the administrator, to combat which of the following
attacks? (Select TWO).
Which of the following controls should be used together to prevent this from occurring?
A recent audit has discovered that at the time of password expiration clients are able to recycle the
previous credentials for authentication. Which of the following controls should be used together to
prevent this from occurring? (Select TWO).