An organization suffered a security breach in which the attacker exploited a Netlogon Remote Protocol vulnerability for further privilege escalation. Which two actions should the incident response team take to prevent this type of attack from reoccurring? (Choose two.)
DrVoIP
8 months, 3 weeks agoDrVoIP
10 months, 2 weeks agojaciro11
1 year, 2 months agoblahblahguy
1 year, 3 months agoBobster02
1 year, 11 months ago