header bg

Scan QR code or get instant email to install app

Question:

A company's network logs are being audited by a security team, and they detect that a USB drive was previously plugged into several of the servers. Using common login details, many login attempts were then successful. To close the vulnerability, which of the following activities should be taken? (Select two.)

A Disable guest account
explanation