<< Prev Question Next Question >>

Question 137/276

John works as a professional Ethical Hacker. He has been assigned a project to test the security of www.we-are-secure.com. He successfully performs a brute force attack on the We-are-secure server.
Now, he suggests some countermeasures to avoid such brute force attacks on the We-are- secure server. Which of the following are countermeasures against a brute force attack?
Each correct answer represents a complete solution. Choose all that apply.

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (276q)
Question 1: You work as a Network Administrator for NetTech Inc. The com...
Question 2: Which field is NOT defined while creating rules for the Netw...
Question 3: Which of the following is a process of monitoring data packe...
Question 4: You have forgotten your password of an online shop. The web ...
Question 5: A project team member has just identified a new project risk...
Question 6: The Project Scope Management knowledge area focuses on which...
Question 7: Which of the following are examples of administrative contro...
Question 8: You work as a Network Administrator for Infonet Inc. The com...
Question 9: Kerberos is a computer network authentication protocol that ...
Question 10: IDS systems can be classified in many different ways. Which ...
Question 11: Sara, a security technician, has received notice that a vend...
Question 12: Which of the following are the countermeasures against WEP c...
Question 13: John works as a professional Ethical Hacker. He has been ass...
Question 14: Which of the following tools can be used for stress testing ...
Question 15: You are working in a functional organization and are managin...
Question 16: Which of the following methods will free up bandwidth in a W...
Question 17: In which of the following attacks does an attacker create th...
Question 18: You work as a Software Developer for PassGuide Inc. The comp...
Question 19: Joseph works as a Network Administrator for WebTech Inc. He ...
Question 20: You are a project manager who is completing a project for an...
Question 21: Which of the following is a physical or logical subnetwork t...
Question 22: Which type of attack is the unauthorized access of informati...
Question 23: Which of the following statements about Digest authenticatio...
Question 24: All of the following are the password cracking attacks perfo...
Question 25: John works as a professional Ethical Hacker. He has been ass...
Question 26: You work as a project manager for TYU project. You are plann...
Question 27: You work as a Network Administrator for Infonet Inc. The com...
Question 28: Which of the following statements about Public Key Infrastru...
Question 29: Victor works as a professional Ethical Hacker for SecureEnet...
Question 30: Which of the following is the practice of a domain name regi...
Question 31: Which of the following statements about IPSec are true? Each...
Question 32: The 3-way handshake method is used by the TCP protocol to es...
Question 33: Which of the following are used as a cost estimating techniq...
Question 34: You work as the Network Administrator for a company that doe...
Question 35: Adrian knows the host names of all the computers on his netw...
Question 36: Which interface does an IPS sensor use to communicate with a...
Question 37: You want to use PGP files for steganography. Which of the fo...
Question 38: John works as an IT Technician for PassGuide Inc. One mornin...
Question 39: You work as a Network Administrator for Tech Perfect Inc. Th...
Question 40: According to the security requirements given in case study, ...
Question 41: Nancy is the project manager for a new construction project....
Question 42: A sequence number is a 32-bit number ranging from 1 to 4,294...
Question 43: What is another term that can be assigned to the pre-program...
Question 44: Which of the following standards is also known as IEEE 802.1...
Question 45: The Human Resources department has a parent shared folder se...
Question 46: Which of the following can be used as a countermeasure again...
Question 47: Which of the following is used to authenticate asymmetric ke...
Question 48: A war dialer is a tool that is used to scan thousands of tel...
Question 49: You work as a Network Administrator for Perfect Solutions In...
Question 50: Your project spans the entire organization. You would like t...
Question 51: John works as a professional Ethical Hacker. He has been ass...
Question 52: John works as a Network Administrator for We-are-secure Inc....
Question 53: Which of the following is an authentication protocol used by...
Question 54: Which of the following tools is based on Linux and used to c...
Question 55: You work as a Network Administrator for Infosec Inc. The com...
Question 56: Which of the following statements about reconnaissance is tr...
Question 57: Which of the following tools can be used to perform ICMP tun...
Question 58: Rick works as the Network Administrator of a Windows 2000 ne...
Question 59: Atechnician is deploying virtual machines for multiple custo...
Question 60: Which of the following statements about Secure Shell (SSH) a...
Question 61: Which of the following is a fake target that deters hackers ...
Question 62: Which of the following blocks unwanted advertisements and sm...
Question 63: John works as a professional Ethical Hacker. He has been ass...
Question 64: On Monday, all company employees report being unable to conn...
Question 65: The Project Scope Management knowledge area focuses on which...
Question 66: Which of the following are the countermeasures against a man...
Question 67: An attacker makes an attempt against a Web server. The resul...
Question 68: What are the steps related to the vulnerability management p...
Question 69: You have inserted a Trojan on your friend's computer and you...
Question 70: Which of the following is a software testing method that use...
Question 71: Which of the following technologies is used to detect unauth...
Question 72: A user in your department complains about a slow Internet co...
Question 73: Which of the following tools is used to attack the Digital W...
Question 74: Which of the following protocols uses a combination of publi...
Question 75: Which of the following options is an approach to restricting...
Question 76: These are false reports about non-existent viruses. In these...
Question 77: You work as a professional Ethical Hacker. You are assigned ...
Question 78: Which of the following attacks allows an attacker to recover...
Question 79: Which of the following components are usually found in an In...
Question 80: Which of the following is used to identify a particular 802....
Question 81: Which of the following is the method of hiding data within a...
Question 82: You are the program manager for your project. You are workin...
Question 83: You have just set up a wireless network for customers at a c...
Question 84: Your company is covered under a liability insurance policy, ...
Question 85: Which of the following is the process of rewriting source an...
Question 86: Which of the following types of authentication is generally ...
Question 87: You are concerned about attackers simply passing by your off...
Question 88: Which of the following cryptographic system services ensures...
Question 89: A company determines a need for additional protection from r...
Question 90: Which of the following tasks can be performed by a malicious...
Question 91: Which of the following attacks allows the bypassing of acces...
Question 92: How can you calculate the Annualized Loss Expectancy (ALE) t...
Question 93: What is a stakeholder analysis chart?...
Question 94: Rick is the project manager for TTM project. He is in the pr...
Question 95: An Active Attack is a type of steganography attack in which ...
Question 96: You are concerned about rogue wireless access points being c...
Question 97: Which of the following techniques is based on a set of crite...
Question 98: SSH is a network protocol that allows data to be exchanged b...
Question 99: Which of the following statements about Encapsulating Securi...
Question 100: Which of the following options is an approach to restricting...
Question 101: One of the sales people in your company complains that somet...
Question 102: Which of the following is a model that uses a predefined set...
Question 103: Part of your change management plan details what should happ...
Question 104: Which of the following files must be configured to enable ho...
Question 105: Which of the following is a virus that can redirect the disk...
Question 106: You are the Network Administrator for a company that frequen...
Question 107: Which of the following features of IE prevent users from a t...
Question 108: David works as a Network Administrator for NetTech Inc. The ...
Question 109: John works as a Security Administrator for Enet Inc. He uses...
Question 110: A user has opened a Web site that automatically starts downl...
Question 111: Which of the following terms describes the statement given b...
Question 112: You are the project manager for your organization and are tr...
Question 113: Which of the following terms describes the statement given b...
Question 114: John works as a professional Ethical Hacker. He has been ass...
Question 115: Matt, the network engineer, has been tasked with separating ...
Question 116: John is a malicious attacker. He illegally accesses the serv...
Question 117: Victor wants to use Wireless Zero Configuration (WZC) to est...
Question 118: In which of the following techniques does an attacker change...
Question 119: In Which of the following types of white box testing are the...
Question 120: You work as a Network Administrator for Net World Internatio...
Question 121: You are a project manager of a large construction project. W...
Question 122: Which of the following viruses is designed to prevent antivi...
Question 123: Which of the following evidences are the collection of facts...
Question 124: Mark works as a Network Administrator for NetTech Inc. Sever...
Question 125: Donna, a stakeholder in your project to create new software,...
Question 126: Which of the following are the types of access controls? Eac...
Question 127: Which of the following can provide security against man-in-t...
Question 128: Which of the following encrypts its code differently with ea...
Question 129: Which of the following refers to the process of verifying th...
Question 130: You are the project manager of the NJJ project. Your enterpr...
Question 131: Victor works as a professional Ethical Hacker for SecureEnet...
Question 132: Which of the following technologies is used to detect unauth...
Question 133: Which of the following attacks is any form of cryptanalysis ...
Question 134: While configuring a new access layer switch, the administrat...
Question 135: Joe, a technician at the local power plant, notices that sev...
Question 136: Which of the following is a part of a company's network that...
Question 137: John works as a professional Ethical Hacker. He has been ass...
Question 138: Mark works as a Network Administrator for NetTech Inc. The c...
Question 139: Maria has been recently appointed as a Network Administrator...
Question 140: Which of the following is used to translate domain names int...
Question 141: You have configured a virtualized Internet browser on your W...
Question 142: A Chief Information Security Officer (CISO) is tasked with o...
Question 143: Which of the following authentication methods is used to ena...
Question 144: Which of the following is a network protocol that allows dat...
Question 145: Which of the following is used for high-level or comprehensi...
Question 146: Which of the following types of attacks cannot be prevented ...
Question 147: You are concerned about war driving bringing hackers attenti...
Question 148: Mark works as a Network Administrator for NetTech Inc. The c...
Question 149: You configure a wireless router at your home. To secure your...
Question 150: You work in an enterprise as a Network Engineer. Your enterp...
Question 151: Which of the following is involved with the improvement of d...
Question 152: You work as an Administrator for Bluesky Inc. The company ha...
Question 153: Fill in the blank with the appropriate term. NOTE. Do not us...
Question 154: Which of the following statements correctly defines a script...
Question 155: You are concerned about possible hackers doing penetration t...
Question 156: John works as a professional Ethical Hacker. He is assigned ...
Question 157: Which of the following wireless security features provides t...
Question 158: Mark works as a Network Administrator for Infonet Inc. The c...
Question 159: Your project is to implement a new operating system for all ...
Question 160: Fill in the blank with the appropriate word. A_______ is a c...
Question 161: Maria works as a Risk Analysis Manager for Gentech Inc. She ...
Question 162: Which of the following items are generally analyzed by Inter...
Question 163: Mark works as a Network Administrator for NetTech Inc. The c...
Question 164: Which of the following protocols is used as a transport prot...
Question 165: You work as a Network Administrator for Blue Well Inc. The c...
Question 166: You check the logs on several clients and find that there is...
Question 167: Fill in the blank with the appropriate word. ________ is als...
Question 168: Rick is a project manager of a construction project. He is a...
Question 169: Adam works as a Penetration Tester for Umbrella Inc. He is a...
Question 170: A router has a single Ethernet connection to a switch. In th...
Question 171: Which of the following tools can be used for the anti-phishi...
Question 172: Which of the following security policies will you implement ...
Question 173: All of the following steps should be taken to prevent a Web ...
Question 174: Which of the following processes is described in the stateme...
Question 175: You are concerned about rogue wireless access points being c...
Question 176: You work as a Network Administrator in a company. The NIDS i...
Question 177: Which of the following types of firewall ensures that the pa...
Question 178: A user has opened a Web site that automatically starts downl...
Question 179: Which of the following algorithms can be used to check the i...
Question 180: You work as a Network Administrator for NetPerfect Inc. You ...
Question 181: Which of the following programs collects email addresses of ...
Question 182: Which of the following programs can collect various types of...
Question 183: Which of the following layers of TCP/IP model is used to mov...
Question 184: Which of the following processes is NOT a part of the Projec...
Question 185: An organization does not have adequate resources to administ...
Question 186: You are a Web Administrator of Millennium Inc. The company h...
Question 187: Which of the following is a type of encryption that uses a s...
Question 188: John works as a professional Ethical Hacker. He has been ass...
Question 189: Which of the following devices would MOST likely have a DMZ ...
Question 190: Which of the following are symptoms of a virus attack on you...
Question 191: You work as a project manager for BlueWell Inc. You are work...
Question 192: Which of the following is a popular replacement for halon ga...
Question 193: Which of the following is the best encryption algorithm to e...
Question 194: Which of the following are countermeasures to prevent unauth...
Question 195: Which of the following terms refers to a prolonged loss of p...
Question 196: You are a project manager for a recycling company. You are i...
Question 197: Which of the following is an input of the close procurements...
Question 198: You are the program manager for your organization. Managemen...
Question 199: Which of the following uses public key cryptography to encry...
Question 200: Which of the following are considered Bluetooth security vio...
Question 201: What does a firewall check to prevent certain ports and appl...
Question 202: Which of the following statements about a certification auth...
Question 203: Which of the following security protocols can be used to sup...
Question 204: Which firewall architecture uses two NICs with a screening r...
Question 205: Which of the following honeypots captures limited amounts of...
Question 206: The Project Procurement Management knowledge area focuses on...
Question 207: Which of the following types of computers is used for attrac...
Question 208: You have installed Windows Vista Home Premium on your home c...
Question 209: In what type of attack does an attacker capture packets cont...
Question 210: Which of the following statements are true about WPA? Each c...
Question 211: Which of the following types of attacks cannot be prevented ...
Question 212: Which of the following are the examples of administrative co...
Question 213: Which of the following terms describes an attempt to transfe...
Question 214: Which of the following are the goals of risk management? Eac...
Question 215: Mark works as a Network Administrator for We-are-secure Inc....
Question 216: A honey pot is a computer trap that is used to attract poten...
Question 217: Which of the following tools can be used to read NetStumbler...
Question 218: You are the Administrator of a Windows 2000 based network fo...
Question 219: Which of the following is not a man-made threat?...
Question 220: John works as a Website Administrator in ABC Inc. The users ...
Question 221: John works as a professional Ethical Hacker. He has been ass...
Question 222: Holly is the project manager of the GHQ Project for her orga...
Question 223: John works as a professional Ethical Hacker. He has been ass...
Question 224: Which of the following is NOT a principle and practice of th...
Question 225: Which of the following wireless standards has a transmission...
Question 226: You are the project manager of the HQQ Project for your comp...
Question 227: Roberta is the project manager of the KJL Project for her co...
Question 228: Which of the following is a signature-based intrusion detect...
Question 229: In which of the following does an attacker use multiple comp...
Question 230: Which of the following firewalls inspects the actual content...
Question 231: You are an Administrator for a network at an investment bank...
Question 232: John works as a Website Administrator in ABC Inc. The compan...
Question 233: Which key of the Asymmetric encryption is used to encrypt th...
Question 234: Management has asked you to perform a risk audit and report ...
Question 235: Which function of incident handling involves in-depth invest...
Question 236: You work in a company that accesses the Internet frequently....
Question 237: Your company network has been infected with a virus. You hav...
Question 238: You work as a professional Ethical Hacker. You are assigned ...
Question 239: Which of the following applications work as mass-emailing wo...
Question 240: Which of the following is used to detect malicious activity ...
Question 241: Janet is the project manager of the NHQ Project for her comp...
Question 242: You and your project team are just starting the risk identif...
Question 243: You are the project manager for the TTR project. You are in ...
Question 244: Which of the following is the best encryption algorithm to e...
Question 245: Which of the following statements about Encapsulating Securi...
Question 246: Which type of virus is able to alter its own code to avoid b...
Question 247: Every network device contains a unique built in Media Access...
Question 248: Which of the following are the tools and techniques of the P...
Question 249: Mark works as a Network Administrator for BlueWell Inc. Whil...
Question 250: Consider the following diagram: (Exhibit) What is the highli...
Question 251: A Security administrator wants to configure policies that di...
Question 252: You work as a Consumer Support Technician for ABC Inc. The c...
Question 253: Which of the following applications would NOT be considered ...
Question 254: You work as a Software Developer for PassGuide Inc. The comp...
Question 255: Which of the following exists between the client and the ser...
Question 256: Which of the following relies on a physical characteristic o...
Question 257: PsPasswd is a tool used by network administrators to change ...
Question 258: In the image of the Screened Host Firewall Architecture give...
Question 259: You work as a Network Administrator for Tech Perfect Inc. Th...
Question 260: What is the term used to describe the cost of the solution a...
Question 261: You see the career section of a company's Web site and analy...
Question 262: Which of the following IEEE standards is defined to enhance ...
Question 263: A security administrator is segregating all web-facing serve...
Question 264: Which of the following heights of fence deters only casual t...
Question 265: What course of action can be taken by a party if the current...
Question 266: Which of the following contains information that is read by ...
Question 267: You are responsible for network security at a defense contra...
Question 268: An executive in your company reports odd behavior on her PDA...
Question 269: Which of the following can be performed to verify the effect...
Question 270: A database administrator contacts a security administrator t...
Question 271: Which of the following terms related to risk management repr...
Question 272: Which of the following is used to translate domain names int...
Question 273: Andrew works as a Network Administrator for Infonet Inc. The...
Question 274: Rick works as a Computer Forensic Investigator for BlueWells...
Question 275: Which of the following viruses replaces the boot sector data...
Question 276: You are the project manager for an important, high-profile p...