[TABS_R id=9422]
A security team is auditing a company’s network logs and notices that a USB drive was previously inserted into several of the servers. Many login attempts were then successfully performed using common login information.
Which of the following actions should be taken to close the vulnerability? (Choose two.)
- Disable guest account
- Remove admin permissions
- Modify AutoRun settings
- Change default credentials
- Run OS security updates
- Install a software firewall
[TABS_R id=9422]