Which of the following security controls is the hacker exploiting?

A hacker has discovered a simple way to disrupt business for the day in a small company which
relies on staff working remotely. In a matter of minutes the hacker was able to deny remotely
working staff access to company systems with a script. Which of the following security controls is
the hacker exploiting?

A hacker has discovered a simple way to disrupt business for the day in a small company which
relies on staff working remotely. In a matter of minutes the hacker was able to deny remotely
working staff access to company systems with a script. Which of the following security controls is
the hacker exploiting?

A.
DoS

B.
Account lockout

C.
Password recovery

D.
Password complexity



Leave a Reply 0

Your email address will not be published. Required fields are marked *