Comp TIA Security + Certification Questions Part 2

© examsiri.com
Question : 39 of 60
 
Marks: +1, -0
A security analyst is investigating a suspected security breach and discovers the following in the logs of the potentially compromised server:
  Time   Source   Destination   Account Name   Action
  11.01.:32   18.12.98.145   10.15.21.100   Joe   Logon Failed
  11.01.:32   18.12.98.145   10.15.21.100   Joe   Logon Failed
  11.01.:33   18.12.98.145   10.15.21.100   Joe   Logon Failed
  11.01.:34   18.12.98.145   10.15.21.100   Joe   Logon Failed
  11.01.:35   18.12.98.145   10.15.21.100   Joe   Logon Failed
  11.01.:36   18.12.98.145   10.15.21.100   Joe   Logon Failed
  11.01.:37   18.12.98.145   10.15.21.100   Joe   Logon Failed
  11.01.:38   18.12.98.145   10.15.21.100   Joe   Logon Successful
Which of the following would be the BEST method for preventing this type of suspected attack in the future?
Go to Question: