Which of the following attacks is BEST mitigated by utilizing strong passwords?
A.
Man-in-the-middle attack
B.
Brute force attack
C.
Remote buffer overflow
D.
Root kit
Explanation:
A brute force attack is normally successful against weak passwords, whereas strong passwords
would not prevent any of the other attacks. Man-in-the-middle attacks intercept network traffic,
which could contain passwords, but is not naturally password-protected. Remote buffer overflows
rarely require a password to exploit a remote host. Root kits hook into the operating system’s
kernel and, therefore, operate underneath any authentication mechanism.