A company's network logs are being audited by a security team, and they detect that a USB drive was previously plugged into several of the servers. Using common login details, many login attempts were then successful. To close the vulnerability, which of the following activities should be taken? (Select two.)
Comments