Every morning, a systems administrator monitors failed login attempts on the company's log management server. The administrator notices the DBAdmin account has five failed username and/or password alerts during a ten-minute window. The systems administrator determines the user account is a dummy account used to attract attackers. Which of the following techniques should the systems administrator implement?
A) Role-based access control
B) Honeypot
C) Rule-based access control
D) Password cracker
Correct Answer:
Verified
Q810: A business sector is highly competitive, and
Q811: A company stores highly sensitive data files
Q812: A security administrator installed a new network
Q813: A technician is configuring a load balancer
Q814: Which of the following is a compensating
Q816: A systems administrator has isolated an infected
Q817: A security analyst receives a notification from
Q818: Several workstations on a network are found
Q819: Which of the following scenarios BEST describes
Q820: A procedure differs from a policy in
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents