A penetration tester was able to retrieve the initial VPN user domain credentials by phishing a member of the IT department. Afterward, the penetration tester obtained hashes over the VPN and easily cracked them using a dictionary attack. Which of the following remediation steps should be recommended? (Select
THREE).
amankry
Highly Voted 5 years, 4 months agosharifengg
Highly Voted 5 years, 4 months agokloug
Most Recent 2 years, 2 months agomiabe
2 years, 9 months agoGDLY
3 years agoJetlife
3 years agoAriel235788
3 years, 5 months agoAriel235788
3 years, 6 months agocvMikazuki
3 years, 6 months agoSciBer
3 years, 6 months agophish7827
3 years, 8 months agoCybeSecN
3 years, 9 months agonakres64
4 years agobzpunk
4 years, 1 month agodyers
3 years, 12 months agoTheThreatGuy
4 years, 3 months agoMarlon_Franco22
4 years, 7 months agonovac1111
4 years, 7 months agoGreyHunter
4 years, 6 months agoLeonar
4 years, 9 months ago