While reviewing switch logs, a network analyst notices many failed logon attempts followed by a successful logon from an unknown IP address. Which of the following hardening techniques should be utilized to prevent unauthorized access?
A) Avoiding common passwords
B) File hashing
C) Disabling unused IP ports
D) Using secure protocols
Correct Answer:
Verified
Q340: Which of the following storage connection types
Q341: Some users are reporting a high response
Q342: A corporation has been the target of
Q343: A technician is making the population of
Q344: A small business utilizes a SOHO router
Q346: Ann, a network technician, has relocated a
Q347: Which of the following BEST describes the
Q348: A company will be hosting a large
Q349: A network administrator needs to implement a
Q350: A technician is required to install a
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents