header bg

Scan QR code or get instant email to install app


A company's network logs are being audited by a security team, and they detect that a USB drive was previously plugged into several of the servers. Using common login details, many login attempts were then successful. To close the vulnerability, which of the following activities should be taken? (Select two.)

A Disable guest account

Related Information


Leave a Reply

Your email address will not be published. Required fields are marked *