An outside organization has completed a penetration test for a company. One of the items on the report is reflecting the ability to read SSL traffic from the web server. Which of the following is the MOST likely mitigation for this reported item?

A. Ensure patches are deployed
B. Install an IDS on the network
C. Configure the firewall to block traffic on port 443
D. Implement a VPN for employees


Answer: A. Ensure patches are deployed

Computer Science & Information Technology

You might also like to view...

If a Vim user wants to use a command that is similar to the Windows copy command, what command should they use?

A. y B. copy C. c D. x

Computer Science & Information Technology

A ________ lists which tables hold the fields used in the SELECT clause

A) FROM clause B) WHERE clause C) JOIN clause D) UNION clause

Computer Science & Information Technology

Identify the letter of the choice that best matches the phrase or definition.

A. Built-in function that calculates the payments for a loan based on constant payments and a constant interest rate B. Class that provides standard math procedures required for mathematical calculations C. Math class method that returns the absolute value of a number D. Math class method that will raise a number to a power E. Method of the Math class that returns the smaller of two numbers F. Math class constant that is the natural exponent

Computer Science & Information Technology

Criteria are __________ that help to identify specific records.

a. fields b. conditions c. foreign keys d. data types

Computer Science & Information Technology