An organization suffered a security breach in which the attacker exploited a Netlogon Remote Protocol vulnerability for further privilege escalation. Which two actions should the incident response team take to
prevent this type of attack from reoccurring? (Choose two.)
Raylene
2 months agoMaryanne
2 months agoSang
7 days agoTeri
14 days agoRima
1 months agoLettie
1 months agoTu
2 months agoGolda
2 months agoJunita
24 days agoMitzie
1 months agoArthur
2 months agoEun
2 months agoDyan
2 months agoEllsworth
3 months agoWilford
3 months agoDawne
1 months agoStephen
1 months agoNakisha
2 months ago