|1:||A remote user tries logging into a remote network but fails after three additional tries and is disconnected. What useful information should the network administrator gather? (Select the best two answers.)|
|A1:||Answer: b and c
Network administrators need the invalid username (because it is not an allowable username) and the invalid password used to see if the intruder is using a text-based algorithm to generate passwords.
|2:||What is the first step that should be implemented in securing any network?|