Which of following would best mitigate the effects of a new ransomware attack that was not properly stopped by the company antivirus?
A high volume of failed RDP authentication attempts was logged on a critical server within a one-hour period. All of the attempts originated from the same remote IP address and made use of a single valid domain user account. Which of the following would be the most effective mitigating control to reduce the rate of success of this brute-force attack?
An analyst suspects cleartext passwords are being sent over the network. Which of the following tools would best support the analyst's investigation?
Which of the following can be used to learn more about TTPs used by cybercriminals?