Which of the follow...
 
Notifications
Clear all

Which of the following actions should be taken to close the vulnerability?

1 Posts
1 Users
0 Likes
66 Views
(@cainsmarshall)
Posts: 692
Noble Member
Topic starter
 

A security team is auditing a company’s network logs and notices that a USB drive was previously inserted into several of the servers. Many login attempts were then successfully performed using common login information.

Which of the following actions should be taken to close the vulnerability? (Select two.)

  • A . Disable guest account
    B. Remove admin permissions
    C. Modify AutoRun settings
    D. Change default credentials
    E. Run OS security updates
    F. Install a software firewall

Show Answer Hide Answer

Suggested Answer: A,C
 
Posted : 13/11/2022 2:43 am
Topic Tags

Latest 220-1002 V1 Dumps Valid Version

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund
Share: