PdfPrep.com

Which of the following hardening techniques should be utilized to prevent unauthorized access?

While reviewing switch logs, a network analyst notices many failed logon attempts followed by a successful logon from an unknown IP address.

Which of the following hardening techniques should be utilized to prevent unauthorized access?
A . Avoiding common passwords
B . File hashing
C . Disabling unused IP ports
D . Using secure protocols

Answer: A

Exit mobile version