Which of the following will set an account to lockout for 30 minutes after the maximum number attempts have failed?
Which of the following authentication models uses a time stamp to prevent the risks associated with a replay attack?
Which of the following should be done if an organization intends to prosecute an attacker once an attack has been completed?
Which of the following disaster recovery components is a location that is completely empty, but allows the infrastructure to be built if the live site goes down?
Which of the following is a technique used by hackers to identify unsecured wireless network locations to other hackers?