Sarah is the security officer for her organization and must be concerned aboutthe many types of threats that exist. She has been told that there have beenattempts by external entities to access resources in an unauthorized manner throughthe organization’s legacy modems. Which of the following controls should Sarahensure that her team implements?
i.Perform brute force war dialing attacks to find weaknesses and hanging modems.
ii. Make sure only necessary phone numbers are made public.
iii. Provide stringent access control methods that would make brute force attacks less successful.
iv. Set lockout thresholds.
A.
i, ii, iii, iv
B.
i, ii
C.
iii, iv
D.
i, iii, iv
Explanation:
These attacks are also used in war dialing efforts, in which the war dialer inserts a long list of phone numbers into a war dialing program in hopes of finding a modem that can be exploited to gain unauthorized access.