Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Isaca Exam CRISC Topic 8 Question 75 Discussion

Actual exam question for Isaca's CRISC exam
Question #: 75
Topic #: 8
[All CRISC Questions]

Which of the following controls would BEST reduce the risk of account compromise?

Show Suggested Answer Hide Answer
Suggested Answer: A

Contribute your Thoughts:

Devorah
2 days ago
Multi-factor authentication is like having a bodyguard for your account - even if the password gets out, the bodyguard ain't letting anyone in without proper ID.
upvoted 0 times
...
Aracelis
7 days ago
Password encryption? That's like putting a bandaid on a broken leg. MFA is the real deal when it comes to reducing account compromise risk.
upvoted 0 times
...
Jade
8 days ago
Enforcing password changes? That's so 2000s. Why bother when you can just have MFA and call it a day? It's like using a sledgehammer to crack a nut.
upvoted 0 times
...
Corrinne
12 days ago
Role-based authentication is great, but it doesn't protect against account compromise on its own. You need that extra layer of MFA to really lock things down.
upvoted 0 times
...
Annice
13 days ago
Multi-factor authentication is the way to go! It's like having a super-powered lock on your account - even if someone steals your password, they can't get in without that extra step.
upvoted 0 times
...
Leoma
16 days ago
C) Enforce role-based authentication. Limiting access based on roles can reduce the risk of compromise.
upvoted 0 times
...
Ronald
20 days ago
A) Enforce password changes. Regularly changing passwords can help prevent unauthorized access.
upvoted 0 times
...
Pearlie
25 days ago
B) Enforce multi-factor authentication (MFA). It adds an extra layer of security.
upvoted 0 times
...

Save Cancel
az-700  pass4success  az-104  200-301  200-201  cissp  350-401  350-201  350-501  350-601  350-801  350-901  az-720  az-305  pl-300  

Warning: Cannot modify header information - headers already sent by (output started at /pass.php:70) in /pass.php on line 77