Which of the following methods is not an effective method for preventing brute-force password guessing attacks via login portals?

A) Using login throttling
B) Returning an HTTP error
C) Using CAPTCHAs
D) Setting a number of failed login account lockout

Answer :

Final answer:

Returning an HTTP error is not an effective method for preventing brute-force password guessing attacks because it does not actively inhibit the attacker from making further attempts.

Explanation:

To answer the question about which methods are not effective for preventing brute-force password guessing attacks via login portals, let's examine the provided options:

  • Using login throttling helps to slow down the rate at which passwords can be guessed, as it limits the number of login attempts over a period.
  • Returning an HTTP error is generally not an effective standalone method for prevention. It might be part of a security response, but it does not necessarily prevent an attacker from continuously attempting to guess passwords. It simply indicates to the client that an error occurred.
  • Using CAPTCHAs is effective since it adds an extra layer of verification that is hard for automated scripts (used in brute-force attacks) to bypass.
  • Setting a number of failed login account lockout is effective in preventing brute-force attacks by locking out the user after a certain number of failed login attempts.

Based on these options, Returning an HTTP error (Option B) is not an effective method to prevent brute-force attacks on its own since it doesn't actively stop the attack from progressing.