What is an insider attack
1. How many failed logons were detected? 2. What was the date/time shown at the top of the IIS log file you captured at the end of Part 2 of the lab? 3. What options are available to prevent brute force authentication attacks in a Windows-based domain? 4. What is an insider attack? 5. If […]