Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

CertNexus Exam ITS-110 Topic 1 Question 32 Discussion

Actual exam question for CertNexus's ITS-110 exam
Question #: 32
Topic #: 1
[All ITS-110 Questions]

An IoT developer discovers that clients frequently fall victim to phishing attacks. What should the developer do in order to ensure that customer accounts cannot be accessed even if the customer's password has been compromised?

Show Suggested Answer Hide Answer
Suggested Answer: B

Contribute your Thoughts:

Mike
1 months ago
I bet the correct answer is 2FA. Unless the developer is living under a rock, that's the obvious choice.
upvoted 0 times
Mireya
10 days ago
B) Enable Kerberos authentication
upvoted 0 times
...
Mollie
14 days ago
A) Implement two-factor authentication (2FA)
upvoted 0 times
...
...
Latonia
2 months ago
LDAPS? What is this, the 90s? 2FA is the only option that actually protects against phishing attacks.
upvoted 0 times
Lisandra
19 days ago
I agree, 2FA is essential in preventing unauthorized access to customer accounts.
upvoted 0 times
...
Marilynn
29 days ago
2FA is definitely the way to go. It adds an extra layer of security.
upvoted 0 times
...
...
Annalee
2 months ago
Account lockout? That's just asking for trouble. Customers will get locked out of their own accounts. 2FA is the clear winner here.
upvoted 0 times
...
Bobbye
2 months ago
Kerberos? That's so old-school. 2FA is the industry standard for IoT security these days.
upvoted 0 times
...
Lucy
2 months ago
Two-factor authentication is definitely the way to go here. Passwords alone just won't cut it these days.
upvoted 0 times
...
Dudley
2 months ago
I think option C) Implement account lockout policies could also be helpful in preventing unauthorized access to customer accounts.
upvoted 0 times
...
Carylon
2 months ago
I agree with Annamae. Two-factor authentication is the best way to protect customer accounts even if passwords are compromised.
upvoted 0 times
...
Annamae
2 months ago
We should definitely go with option A) Implement two-factor authentication (2FA). It adds an extra layer of security.
upvoted 0 times
...

Save Cancel