Which of the following attacks is BEST mitigated by utilizing strong passwords?

Which of the following attacks is BEST mitigated by utilizing strong passwords?

Which of the following attacks is BEST mitigated by utilizing strong passwords?

A.
Man-in-the-middle attack

B.
Brute force attack

C.
Remote buffer overflow

D.
Root kit

Explanation:

A brute force attack is normally successful against weak passwords, whereas strong passwords
would not prevent any of the other attacks. Man-in-the-middle attacks intercept network traffic,
which could contain passwords, but is not naturally password-protected. Remote buffer overflows
rarely require a password to exploit a remote host. Root kits hook into the operating system’s
kernel and, therefore, operate underneath any authentication mechanism.



Leave a Reply 0

Your email address will not be published. Required fields are marked *