A hacker has discovered a simple way to disrupt business for the day in a small company which
relies on staff working remotely. In a matter of minutes the hacker was able to deny remotely
working staff access to company systems with a script. Which of the following security controls is
the hacker exploiting?
A.
DoS
B.
Account lockout
C.
Password recovery
D.
Password complexity