A penetration testing service hired by the company has reported that a backdoor was identified on the network. What action should the organization take to find out if systems have been compromised?
- Look for policy changes in Event Viewer.
- Look for unauthorized accounts.
- Look for usernames that do not have passwords.
- Scan the systems for viruses.
Для просмотра статистики ответов нужно
войти.