Joe analyzed the following log and determined the security team should implement which of the following as a mitigation method against further attempts? Host 192.168.1.123 [00: 00: 01]Successful Login: 015 192.168.1.123 : local [00: 00: 03]Unsuccessful Login: 022 214.34.56.006 : RDP 192.168.1.124 [00: 00: 04]UnSuccessful Login: 010 214.34.56.006 : RDP 192.168.1.124 [00: 00: 07]UnSuccessful Login: 007 214.34.56.006 : RDP 192.168.1.124 [00: 00: 08]UnSuccessful Login: 003 214.34.56.006 : RDP 192.168.1.124
A. Reporting
B. IDS
C. Monitor system logs
D. Hardening
Answer: D. Hardening
Computer Science & Information Technology
You might also like to view...
Write the syntax of a tcpdump command that captures packets containing IP datagrams with a source or destination IP address equal to 10.0.1.12.
What will be an ideal response?
Computer Science & Information Technology
List at least three of the technical problems that must be solved by the designers of MMOGs.
What will be an ideal response?
Computer Science & Information Technology
Index entries are added to the Index panel.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
When you convert a cell into multiple cells, it is called ____ cells.
A. selecting B. drawing C. merging D. splitting
Computer Science & Information Technology