Question: Sarah is the security officer for her organization and must be concerned aboutthe many types of threats that exist. She has been told that there have beenattempts by external entities to access resources in an unauthorized manner throughthe organization’s legacy modems. Which of the following controls should Sarahensure that her team implements?
i.Perform brute force war dialing attacks to find weaknesses and hanging modems.
ii. Make sure only necessary phone numbers are made public.
iii. Provide stringent access control methods that would make brute force attacks less successful.
iv. Set lockout thresholds.
A. i, ii, iii, iv
B. i, ii
C. iii, iv
D. i, iii, iv

Download pdf (with explanations) edition of this exam.