Match the cybersecurity threat to the following control activity:
-Ensure that the information system enforces minimum password complexity of specified case sensitivity, character numbers, and mix of uppercase and lowercase letters, including minimum requirements for each type.
A) Brute-force attack
B) On-path attack
C) IP spoofing
D) Tailgating
Correct Answer:
Verified
Q59: NIST provides explicit guidelines that companies can
Q60: NIST provides explicit guidelines that companies can
Q61: NIST provides explicit guidelines that companies can
Q62: NIST provides explicit guidelines that companies can
Q63: On-path attacks, which were once known as
Q65: Match the cybersecurity threat to the following
Q66: Match the cybersecurity threat to the following
Q67: Match the cybersecurity threat to the following
Q68: Match the cybersecurity threat to the following
Q69: Match the cybersecurity threat to the following
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents