PrepAway - Latest Free Exam Questions & Answers

which of the following should be used to identify the source of the attack?

A network administrator opens up the RDP port to access network resources from home. Several
months later, the administrator’s account is getting locked out constantly. After closing the port,
which of the following should be used to identify the source of the attack?

PrepAway - Latest Free Exam Questions & Answers

A.
Network maps

B.
Change management

C.
Log analysis

D.
Protocol analyzer


Leave a Reply