An organization suffered a security breach in which the attacker exploited a Netlogon Remote Protocol vulnerability for further privilege escalation. Which two actions should the incident response team take to prevent this type of attack from reoccurring? (Choose two.)
DrVoIP
10 months, 2 weeks agoDrVoIP
1 year agojaciro11
1 year, 4 months agoblahblahguy
1 year, 5 months agoBobster02
2 years, 1 month ago