To prevent the abuse of stolen credentials, two effective configuration elements are:
Multi-Factor Authentication (MFA) (C): Implementing MFA adds an additional layer of security by requiring users to provide two or more verification factors to gain access to a resource such as an application or online account. This significantly reduces the risk of credential abuse because even if the credentials are stolen, the attacker would still need the second factor to gain access.
URL Filtering Profiles (D): URL Filtering Profiles help prevent access to malicious or inappropriate websites. By restricting access to known phishing and malicious sites, URL filtering can prevent users from inadvertently entering their credentials on fraudulent websites, thereby reducing the chances of credential theft and misuse.
Chosen Answer:
This is a voting comment (?). You can switch to a simple comment. It is better to Upvote an existing comment if you don't have anything to add.
Submit