subject

While investigating an incident in a company's SIEM console, a security analyst found hundreds of failed SSH login attempts, which all occurred in rapid succession. The failed attempts were followed by a successful login on the root user. Company policy allows systems administrators to manage their systems only from the company's internal network using their assigned corporate logins. Which of the following are the BEST actions the analyst can take to stop any further compromise? A) Add a rule on the affected system to block access to port TCP/22.
B) Reset the passwords for all accounts on the affected system.
C) Add a rule on the perimeter firewall to block the source IP address.
D) Configure /etc/sshd_config to deny root logins and restart the SSHD service.
E) Configure /etc/passwd to deny root logins and restart the SSHD service.
F) Add a rule on the network IPS to block SSH user sessions.

ansver
Answers: 2

Another question on Computers and Technology

question
Computers and Technology, 22.06.2019 01:20
What is the full meaning of rfid in computer
Answers: 2
question
Computers and Technology, 22.06.2019 17:30
How do you make a lenny face? plz, brailiest to who can answer first.
Answers: 1
question
Computers and Technology, 22.06.2019 21:30
The salespeople at hyperactive media sales all use laptop computers so they can take data with them on the road. you are a salesperson for superduper lightspeed computers talking to hyperactive media sales about upgrading the laptops to windows 10. explain how network location awareness in windows 10 would make the laptops more secure.
Answers: 3
question
Computers and Technology, 23.06.2019 01:00
Let r be a robotic arm with a fixed base and seven links. the last joint of r is a prismatic joint, the other ones are revolute joints. give a set of parameters that determines a placement of r. what is the dimension of the configuration space resulting from your choice of parameters?
Answers: 3
You know the right answer?
While investigating an incident in a company's SIEM console, a security analyst found hundreds of fa...
Questions
question
Mathematics, 14.10.2019 11:20
question
History, 14.10.2019 11:20
question
Mathematics, 14.10.2019 11:20