Which of the following attacks is BEST mitigated by utilizing strong passwords?

Posted by: Pdfprep Category: CISM Tags: , ,

Which of the following attacks is BEST mitigated by utilizing strong passwords?
A . Man-in-the-middle attack
B . Brute force attack
C . Remote buffer overflow
D . Root kit

Answer: B

Explanation:

A brute force attack is normally successful against weak passwords, whereas strong passwords would not prevent any of the other attacks. Man-in-the-middle attacks intercept network traffic, which could contain passwords, but is not naturally password-protected. Remote buffer overflows rarely require a password to exploit a remote host. Root kits hook into the operating system’s kernel and, therefore, operate underneath any authentication mechanism.

Leave a Reply

Your email address will not be published.