Which of the following practices is used to mitigate a known security vulnerability?
A. Application fuzzing
B. Patch management
C. Password cracking
D. Auditing security logs
CompTIA exam questions
Which of the following practices is used to mitigate a known security vulnerability?
A. Application fuzzing
B. Patch management
C. Password cracking
D. Auditing security logs
Which of the following password attacks is MOST likely to crack the largest number of randomly generated passwords?
A. Hybrid
B. Birthday attack
C. Dictionary
D. Rainbow tables
Several employee accounts appear to have been cracked by an attacker. Which of the following should the security administrator implement to mitigate password cracking attacks? (Select TWO).
A. Increase password complexity
B. Deploy an IDS to capture suspicious logins
C. Implement password history
D. Implement monitoring of logins
E. Implement password expiration
F. Increase password length
Which of the following can Peter, a security administrator, use to distribute the processing effort when generating hashes for a password cracking program?
A. RAID
B. Clustering
C. Redundancy
D. Virtualization
A user has forgotten their BIOS password on their computer. Which of the following would a technician use to allow the user access to their PC?
A. Remove the BIOS chip on the PC
B. Re-flash the BIOS
C. Run password cracking software on the user’s PC
D. Set the password clear jumper on the motherboard