nerdexam
(ISC)2(ISC)2

CISSP · Question #203

CISSP Question #203: Real Exam Question with Answer & Explanation

The correct answer is D: Use two-factor authentication mechanisms. The best way to mitigate the issue of a perpetrator compromising a network by gaining access to the network through an SSL VPN gateway by guessing a username and brute forcing the password is to use two-factor authentication mechanisms. Two-factor authentication is a method of ve

Submitted by ravi_2018· Mar 5, 2026Identity and Access Management

Question

After a thorough analysis, it was discovered that a perpetrator compromised a network by gaining access to the network through a Secure Socket Layer (SSL) Virtual Private Network (VPN) gateway. The perpetrator guessed a username and brute forced the password to gain access. Which of the following BEST mitigates this issue?

Options

  • AImplement strong passwords authentication for VPN
  • BIntegrate the VPN with centralized credential stores
  • CImplement an Internet Protocol Security (IPSec) client
  • DUse two-factor authentication mechanisms

Explanation

The best way to mitigate the issue of a perpetrator compromising a network by gaining access to the network through an SSL VPN gateway by guessing a username and brute forcing the password is to use two-factor authentication mechanisms. Two-factor authentication is a method of verifying the identity of a user or device by requiring two different types of factors, such as something the user knows (e.g., password, PIN, etc.), something the user has (e.g., token, smart card, etc.), or something the user is (e.g., biometric, fingerprint, etc.). Two-factor authentication can enhance the security of the network access by making it harder for attackers to impersonate or compromise the legitimate users or devices. If the perpetrator only knows the username and password, they will not be able to access the network without the second factor, such as a token

Topics

#VPN security#authentication#brute-force mitigation#two-factor authentication

Community Discussion

No community discussion yet for this question.

Full CISSP PracticeBrowse All CISSP Questions