Comp TIA Security + Certification Questions Part 2
© examsiri.com
Question : 39 of 60
Marks:
+1,
-0
A security analyst is investigating a suspected security breach and discovers the following in the logs of the potentially compromised server:
Which of the following would be the BEST method for preventing this type of suspected attack in the future?
Time | Source | Destination | Account Name | Action |
|---|---|---|---|---|
11.01.:32 | 18.12.98.145 | 10.15.21.100 | Joe | Logon Failed |
11.01.:32 | 18.12.98.145 | 10.15.21.100 | Joe | Logon Failed |
11.01.:33 | 18.12.98.145 | 10.15.21.100 | Joe | Logon Failed |
11.01.:34 | 18.12.98.145 | 10.15.21.100 | Joe | Logon Failed |
11.01.:35 | 18.12.98.145 | 10.15.21.100 | Joe | Logon Failed |
11.01.:36 | 18.12.98.145 | 10.15.21.100 | Joe | Logon Failed |
11.01.:37 | 18.12.98.145 | 10.15.21.100 | Joe | Logon Failed |
11.01.:38 | 18.12.98.145 | 10.15.21.100 | Joe | Logon Successful |
Go to Question: