ExamGecko
Question list
Search
Search

Question 320 - CISM discussion

Report
Export

An organization has identified an increased threat of external brute force attacks in its environment. Which of the following is the MOST effective way to mitigate this risk to the organization's critical systems?

A.
Implement multi-factor authentication.
Answers
A.
Implement multi-factor authentication.
B.
Increase the frequency of log monitoring and analysis.
Answers
B.
Increase the frequency of log monitoring and analysis.
C.
Implement a security information and event management system (SIEM),
Answers
C.
Implement a security information and event management system (SIEM),
D.
Increase the sensitivity of intrusion detection systems (IDSs).
Answers
D.
Increase the sensitivity of intrusion detection systems (IDSs).
Suggested answer: A

Explanation:

A brute force attack is a type of cyberattack that attempts to gain unauthorized access to an account, file, or other protected information by trying different combinations of usernames and passwords until finding the correct one. Brute force attacks can be very effective if the target system has weak or default passwords, or if the attacker has access to a large number of potential credentials. To mitigate this risk, an organization should implement multi-factor authentication (MFA) for its critical systems. MFA is a security method that requires users to provide more than one piece of evidence to verify their identity before accessing a system or service. For example, MFA can involve using a password in addition to a code sent to a phone or email, or using a biometric factor such as a fingerprint or face scan. MFA can significantly reduce the impact of brute force attacks by making it harder for attackers to guess or obtain valid credentials, and by increasing the time and effort required for them to compromise the system.Reference= CISM Review Manual (Digital Version), Chapter 3: Information Security Risk Management, Section 3.1: Risk Identification, p.115-1161. CISM Review Manual (Print Version), Chapter 3: Information Security Risk Management, Section 3.1: Risk Identification, p.115-1162. CISM ITEM DEVELOPMENT GUIDE, Domain 3: Information Security Program Development and Management, Task Statement 3.1, p.193.

asked 01/10/2024
chitranjan ranga
33 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first