Which of the following should be performed?
During an audit, the security administrator discovers that there are several users that are no longer
employed with the company but still have active user accounts. Which of the following should be
performed?
Which of the following security controls is the hacker exploiting?
A hacker has discovered a simple way to disrupt business for the day in a small company which relies on
staff working remotely. In a matter of minutes the hacker was able to deny remotely working staff access
to company systems with a script. Which of the following security controls is the hacker exploiting?
which of the following attacks?
Account lockout is a mitigation strategy used by Jane, the administrator, to combat which of the following
attacks? (Select TWO).
Which of the following controls should be used together to prevent this from occurring?
A recent audit has discovered that at the time of password expiration clients are able to recycle the
previous credentials for authentication. Which of the following controls should be used together to
prevent this from occurring? (Select TWO).
which of the following?
A password history value of three means which of the following?
Which of the following, when used together, would BEST prevent users from reusing their existing password?
An administrator discovers that many users have used their same passwords for years even though the
network requires that the passwords be changed every six weeks. Which of the following, when used
together, would BEST prevent users from reusing their existing password? (Select TWO).
Which of the following would BEST prevent this behavior?
A system administrator has noticed that users change their password many times to cycle back to the
original password when their passwords expire. Which of the following would BEST prevent this
behavior?
Which of the following is an important implementation consideration when deploying a wireless network that use
Which of the following is an important implementation consideration when deploying a wireless network
that uses a shared password?
Which of the following additional policies should be implemented based on the tool’s output?
A security administrator is reviewing the below output from a password auditing tool:
P@ss.
@pW1.
S3cU4
Which of the following additional policies should be implemented based on the tool’s output?
Which of the following should the security administrator implement to mitigate password cracking attacks?
Several employee accounts appear to have been cracked by an attacker. Which of the following should
the security administrator implement to mitigate password cracking attacks? (Select TWO).