subject

Asecurity team is auditing a company’s network logs and notices that a usb drive was previously inserted into several of the servers. many login attempts were then successfully performed using common login information. which of the following actions should be taken to close the vulnerability? (select two.)
(a) disable guest account
(b) remove admin permissions
(c) modify autorun settings
(d) change default credentials
(e) run os security updates
(f) install a software firewall

ansver
Answers: 3

Other questions on the subject: Computers and Technology

image
Computers and Technology, 22.06.2019 20:00, bowmanari2154
What is used to analyze and summarize your data without graphical support
Answers: 1
image
Computers and Technology, 23.06.2019 09:30, ranmmm
The place where the extended axis of the earth would touch the celestial sphere is called the celestial
Answers: 1
image
Computers and Technology, 23.06.2019 10:30, tommyaberman
Would a ps4 wired controller work on an xbox one
Answers: 1
image
Computers and Technology, 23.06.2019 15:30, Dweath50
The processing of data in a computer involves the interplay between its various hardware components.
Answers: 1
You know the right answer?
Asecurity team is auditing a company’s network logs and notices that a usb drive was previously inse...

Questions in other subjects:

Konu
Business, 12.06.2021 23:20
Konu
Mathematics, 12.06.2021 23:20