Independence Day Deal! Unlock 25% OFF Today – Limited-Time Offer - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Isaca Exam Cybersecurity-Audit-Certificate Topic 1 Question 19 Discussion

Actual exam question for Isaca's Cybersecurity-Audit-Certificate exam
Question #: 19
Topic #: 1
[All Cybersecurity-Audit-Certificate Questions]

A security setting to lock a profile after a certain number of unsuccessful login attempts would be MOST effective against which type of attack?

Show Suggested Answer Hide Answer
Suggested Answer: B

When employees use personal mobile devices to access a VPN, the greatest concern for an IS auditor is the potential for sensitive data to be stored in an unsecured manner. If data is stored in plain text, it could be easily accessed by unauthorized parties if the device is lost, stolen, or compromised. This risk is heightened when the devices are not managed by the organization's IT department, which would typically enforce security policies such as encryption.


Contribute your Thoughts:

Noah
1 months ago
Brute force, huh? Sounds like a job for the 'Hulk Smash' method of security. I'm just imagining a big green guy angrily locking down profiles left and right. 'Puny hacker, you no get in!'
upvoted 0 times
...
Mindy
1 months ago
Backdoor? Really? That's more about hidden access points, not login security. Brute force is the way to go here, folks. Unless the answer is 'all of the above' and the real solution is to just turn off the computer. *wink wink*
upvoted 0 times
Loise
7 days ago
B: I agree, brute force is the most effective against multiple login attempts
upvoted 0 times
...
Arthur
13 days ago
A: Brute force
upvoted 0 times
...
...
Francine
2 months ago
Wait, is this a trick question? I thought Man-in-the-middle would be the right answer, but I guess that's more about intercepting communication rather than login attempts. Brute force it is!
upvoted 0 times
Dona
21 days ago
It's not a trick question, Brute force is the most effective attack that can be prevented with this security setting.
upvoted 0 times
...
Chaya
1 months ago
Yeah, locking the profile after unsuccessful attempts would definitely help against that.
upvoted 0 times
...
Sherill
1 months ago
I think Brute force is the right answer.
upvoted 0 times
...
...
Julieta
2 months ago
I was thinking Buffer overflow, but that's more about exploiting software vulnerabilities. Locking the profile is a security measure, so it makes sense for Brute force attacks.
upvoted 0 times
Muriel
27 days ago
C: Agreed, it's a good way to prevent someone from guessing passwords over and over.
upvoted 0 times
...
Oretha
1 months ago
B: Yeah, locking the profile after failed attempts would definitely help against that.
upvoted 0 times
...
Karma
1 months ago
A: I think it's Brute force.
upvoted 0 times
...
...
Honey
2 months ago
Brute force, definitely! Locking the profile after failed attempts is a great way to stop those pesky hackers from guessing their way in.
upvoted 0 times
Nicolette
13 days ago
Actually, locking the profile after failed attempts is more effective against brute force attacks, not backdoor attacks.
upvoted 0 times
...
Denise
18 days ago
C) Backdoor
upvoted 0 times
...
Virgie
1 months ago
I agree, brute force attacks can be prevented by locking the profile after multiple failed login attempts.
upvoted 0 times
...
Janessa
2 months ago
A) Brute force
upvoted 0 times
...
...
Herminia
2 months ago
I'm not sure, but I think locking a profile after unsuccessful login attempts would definitely help prevent brute force attacks.
upvoted 0 times
...
Amber
3 months ago
I agree with Fidelia. Brute force attacks rely on trying multiple passwords until the correct one is found.
upvoted 0 times
...
Fidelia
3 months ago
I think the answer is A) Brute force.
upvoted 0 times
...

Save Cancel
az-700  pass4success  az-104  200-301  200-201  cissp  350-401  350-201  350-501  350-601  350-801  350-901  az-720  az-305  pl-300  

Warning: Cannot modify header information - headers already sent by (output started at /pass.php:70) in /pass.php on line 77