PrepAway - Latest Free Exam Questions & Answers

which of the following as a mitigation method against f…

Joe analyzed the following log and determined the security team should implement which of the following as a mitigation method against further attempts?

Host 192.168.1.123
[00: 00: 01]Successful Login: 015 192.168.1.123 : local
[00: 00: 03]Unsuccessful Login: 022 214.34.56.006 : RDP 192.168.1.124
[00: 00: 04]UnSuccessful Login: 010 214.34.56.006 : RDP 192.168.1.124
[00: 00: 07]UnSuccessful Login: 007 214.34.56.006 : RDP 192.168.1.124
[00: 00: 08]UnSuccessful Login: 003 214.34.56.006 : RDP 192.168.1.124

PrepAway - Latest Free Exam Questions & Answers

A.
Reporting

B.
IDS

C.
Monitor system logs

D.
Hardening

Explanation:
We can see a number of unsuccessful login attempts using a Remote Desktop Connection (using the RDP protocol) from a computer with the IP address
192.168.1.124. Someone successfully logged in locally. This is probably an authorized login (for example, Joe logging in).
Hardening is the process of securing a system. We can harden (secure) the system by either disallowing remote desktop connections altogether or by restricting
which IPs are allowed to initiate remote desktop connections.
Incorrect Answers:
A: Reporting is not used to prevent unauthorized login attempts. Therefore, this answer is incorrect.
B: An intrusion detection system (IDS) is a device or software application that monitors network or system activities for malicious activities or policy violations and
produces reports to a management station. An IDS could detect the attempted logins but it would not prevent them. “Hardening” is a basic security principle which
should be applied to every system. Therefore, this answer is incorrect.
C: Monitoring system logs will keep you informed about any potential problems with the computer system. However, it will not prevent unauthorized login attempts.
Therefore, this answer is incorrect.


Leave a Reply