ISC CISSP Question Answer
After a thorough analysis, it was discovered that a perpetrator compromised a network by gaining access to the network through a Secure Socket Layer (SSL) Virtual Private Network (VPN) gateway. The perpetrator guessed a username and brute forced the password to gain access. Which of the following BEST mitigates this issue?
ISC CISSP Summary
- Vendor: ISC
- Product: CISSP
- Update on: Jul 25, 2025
- Questions: 1486