Configuring an account to disable itself after a set number of login attempts using invalid passwords is a method of countering a ________.
A. brute-force attack
B. spammer
C. worm
D. Trojan horse
Answer: A
Computer Science & Information Technology
You might also like to view...
Periodic audits should be a part of any security plan
Indicate whether the statement is true or false.
Computer Science & Information Technology
Which of the following tasks cannot be performed using an enhanced for loop?
a. Calculating the product of all the values in an array. b. Displaying all even element values in an array. c. Comparing the elements in an array to a specific value. d. Incrementing the value stored in each element of the array.
Computer Science & Information Technology