During a brute force attack against an online service, the penetration tester is able to try 1000 passwords per second without any restrictions from the application. This scenario indicates that the application is not equipped with proper account lockout mechanisms.
The correct answer is 'True' because in a secure online application, after a certain number of failed login attempts, account lockout mechanisms should be triggered to prevent further attempts, slowing down or halting brute force attacks. The scenario suggests that the absence of such security controls allows the penetration tester to attempt a large volume of passwords in a short period.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are account lockout mechanisms?
Open an interactive chat with Bash
Why is brute force a security concern for online applications?
Open an interactive chat with Bash
How can an application improve security against brute force attacks?