Which of the following actions should be taken to close the vulnerability?

A security team is auditing a company’s network logs and notices that a USB drive was previously inserted into several of the servers. Many login attempts were then successfully performed using common login information.

Which of the following actions should be taken to close the vulnerability? (Select two.)
A . Disable guest account
B . Remove admin permissions
C . Modify AutoRun settings
D . Change default credentials
E . Run OS security updates
F . Install a software firewall

Answer: A, C

Latest 220-1002 Dumps Valid Version with 623 Q&As

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments