Which of the following hardening techniques should be utilized to prevent unauthorized access?

While reviewing switch logs, a network analyst notices many failed logon attempts followed by a successful logon from an unknown IP address. Which of the following hardening techniques should be utilized to prevent unauthorized access?
A. Avoiding common passwords
B. File hashing
C. Disabling unused IP ports
D. Using secure protocols

Exam N10-008: CompTIA Network+

Free dumps for N10-008 in PDF format.

High quality N10-008 PDF and software. VALID exam to help you pass.

comptia-exams

Leave a Reply

Your email address will not be published. Required fields are marked *


The reCAPTCHA verification period has expired. Please reload the page.