Which of the following should be used to identify the source of the attack?

A network administrator opens up the RDP port to access network resources from home. Several months later, the administrator’s account is getting locked out constantly. After closing the port, which of the following should be used to identify the source of the attack?
A. Network maps
B. Change management
C. Log analysis
D. Protocol analyzer

Exam N10-008: CompTIA Network+

Free dumps for N10-008 in PDF format.

High quality N10-008 PDF and software. VALID exam to help you pass.

comptia-exams

Leave a Reply

Your email address will not be published. Required fields are marked *


The reCAPTCHA verification period has expired. Please reload the page.