Which of the following hardening techniques should be utilized to prevent unauthorized access?

Posted by: Pdfprep Category: N10-007 Tags: , ,

While reviewing switch logs, a network analyst notices many failed logon attempts followed by a successful logon from an unknown IP address.

Which of the following hardening techniques should be utilized to prevent unauthorized access?
A . Avoiding common passwords
B . File hashing
C . Disabling unused IP ports
D . Using secure protocols

Answer: A

Leave a Reply

Your email address will not be published.