Multiple Choice
While reviewing switch logs, a network analyst notices many failed logon attempts followed by a successful logon from an unknown IP address. Which of the following hardening techniques should be utilized to prevent unauthorized access?
A) Avoiding common passwords
B) File hashing
C) Disabling unused IP ports
D) Using secure protocols
Correct Answer:

Verified
Correct Answer:
Verified
Q111: The Chief Information Officer (CIO) has noticed
Q112: A technician is surveying a college's network
Q113: A company's web-based application has a database
Q114: A network technician needs to upgrade a
Q115: A network engineer wants to segment the
Q117: A network engineer is creating a method
Q118: A network administrator is configuring the 172.16.40.0/22
Q119: A network technician is installing a network
Q120: Which of the following BEST describe the
Q121: A network technician is installing a new