A penetration testing service hired by the company has reported that a backdoor was identified on the network. What action should the organization take to find out if systems have been compromised?

  • Look for policy changes in Event Viewer.
  • Look for unauthorized accounts.
  • Look for usernames that do not have passwords.
  • Scan the systems for viruses.
Для просмотра статистики ответов нужно войти.