An organization suffered a security breach in which the attacker exploited a Netlogon Remote Protocol vulnerability for further privilege escalation. Which two actions should the incident response team take to
prevent this type of attack from reoccurring? (Choose two.)
Raylene
8 months agoMaryanne
8 months agoSang
7 months agoTeri
7 months agoRima
7 months agoLettie
7 months agoTu
8 months agoGolda
8 months agoJunita
7 months agoMitzie
8 months agoArthur
8 months agoEun
9 months agoDyan
9 months agoEllsworth
9 months agoWilford
9 months agoDawne
8 months agoStephen
8 months agoNakisha
8 months ago