Which the following controls would best mitigate this risk?

A recent online password audit has identified that stale accounts are at risk to brute force attacks.
Which the following controls would best mitigate this risk?

A recent online password audit has identified that stale accounts are at risk to brute force attacks.
Which the following controls would best mitigate this risk?

A.
Password length

B.
Account disablement

C.
Account lockouts

D.
Password complexity

Explanation:



Leave a Reply 5

Your email address will not be published. Required fields are marked *

5 × two =


Dugan Nash

Dugan Nash

I think account disablement is the better choice. It would be impossible to log in to a disabled account.

With account lockouts, if the lockout threshold is 10, for example, and the lockout duration is 30 minutes, then attacker has a much better chance at accessing the account.

Paul

Paul

I can’t see a reason why a stale account would be active and available for attack. Most of these types of attacks are after you steal the security account manager (SAM) database so the account lockout would have no value. Complexity and length would be useful to stop/delay a SAM attack. But if it is a stale account, it should be disabled or deleted. I agree with B

tester

tester

B, stale account must be disabled

Dan

Dan

I would go with B. If an account is stale then that means its inactive. Which you would want to disable. If the account is active then you would enforce account lockouts.