which of the following should be used to identify the source of the attack?

A network administrator opens up the RDP port to access network resources from home. Several
months later, the administrator’s account is getting locked out constantly. After closing the port,
which of the following should be used to identify the source of the attack?

A network administrator opens up the RDP port to access network resources from home. Several
months later, the administrator’s account is getting locked out constantly. After closing the port,
which of the following should be used to identify the source of the attack?

A.
Network maps

B.
Change management

C.
Log analysis

D.
Protocol analyzer



Leave a Reply 0

Your email address will not be published. Required fields are marked *