An organization suffered a security breach in which the attacker exploited a Netlogon Remote Protocol vulnerability for further privilege escalation. Which two actions should the incident response team take to
prevent this type of attack from reoccurring? (Choose two.)
Raylene
6 months agoMaryanne
6 months agoSang
5 months agoTeri
5 months agoRima
6 months agoLettie
6 months agoTu
7 months agoGolda
7 months agoJunita
6 months agoMitzie
6 months agoArthur
6 months agoEun
7 months agoDyan
7 months agoEllsworth
7 months agoWilford
7 months agoDawne
6 months agoStephen
6 months agoNakisha
6 months ago