which of the following as a mitigation method against further attempts?
Joe analyzed the following log and determined the security team should implement which of the
following as a mitigation method against further attempts?
Host 192.168.1.123
[00: 00: 01]Successful Login: 015 192.168.1.123 : local
[00: 00: 03]Unsuccessful Login: 022 214.34.56.006 : RDP 192.168.1.124
[00: 00: 04]UnSuccessful Login: 010 214.34.56.006 : RDP 192.168.1.124
[00: 00: 07]UnSuccessful Login: 007 214.34.56.006 : RDP 192.168.1.124
[00: 00: 08]UnSuccessful Login: 003 214.34.56.006 : RDP 192.168.1.124
Which of the following can the CTO implement requiring the LEAST change to existing systems?
The Chief Technology Officer (CTO) wants to improve security surrounding storage of customer
passwords.
The company currently stores passwords as SHA hashes. Which of the following can the CTO
implement requiring the LEAST change to existing systems?
Which of the following would mitigate and secure the auditors finding?
An auditor’s report discovered several accounts with no activity for over 60 days. The accounts
were later identified as contractors’ accounts who would be returning in three months and would
need to resume the activities. Which of the following would mitigate and secure the auditors
finding?
Which of the following can be implemented to increase security and prevent this from happening?
An administrator notices that former temporary employees’ accounts are still active on a domain.
Which of the following can be implemented to increase security and prevent this from happening?
Which of the following can be implemented to increase security and prevent this from happening?
An administrator notices that former temporary employees’ accounts are still active on a domain.
Which of the following can be implemented to increase security and prevent this from happening?
How must user accounts for exiting employees be handled?
How must user accounts for exiting employees be handled?
Which of the following would BEST address this desire?
An administrator has a network subnet dedicated to a group of users. Due to concerns regarding
data and network security, the administrator desires to provide network access for this group only.
Which of the following would BEST address this desire?
Which of the following would BEST address this desire?
An administrator has a network subnet dedicated to a group of users. Due to concerns regarding
data and network security, the administrator desires to provide network access for this group only.
Which of the following would BEST address this desire?
Which of the following is the MOST likely reason the users are unable to connect to the server?
A new virtual server was created for the marketing department. The server was installed on an
existing host machine. Users in the marketing department report that they are unable to connect to
the server. Technicians verify that the server has an IP address in the same VLAN as the
marketing department users. Which of the following is the MOST likely reason the users are
unable to connect to the server?
Which of the following can be implemented if a security administrator wants only certain devices connecting to
Which of the following can be implemented if a security administrator wants only certain devices
connecting to the wireless network?