Many login attempts were then successfully performed using common login information. Which of the following actions should be taken to close the vulnerability? (Choose two.)

Last Updated on August 4, 2021 by Admin 2

A security team is auditing a company’s network logs and notices that a USB drive was previously inserted into several of the servers. Many login attempts were then successfully performed using common login information.

Which of the following actions should be taken to close the vulnerability? (Choose two.)

  • Disable guest account
  • Remove admin permissions
  • Modify AutoRun settings
  • Change default credentials
  • Run OS security updates
  • Install a software firewall
0 0 votes
Article Rating
Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments