A security analyst is reviewing firewall logs while investigating a compromised web server. The following ports appear in the log: 22, 25, 445, 1433, 3128, 3389, 6667 Which of the following protocols was used to access the server remotely?

A. LDAP
B. HTTP
C. RDP
D. HTTPS


Answer: C. RDP

Computer Science & Information Technology

You might also like to view...

You can subtly mask or show non-destructive filters using the ____ mask in conjunction with the Brush tool, a gradient, etc.

A. motion B. filter C. spot D. shadow

Computer Science & Information Technology

Which PowerPoint screen element displays a large image of the active slide?

A) Slide pane B) Status bar C) Notes pane D) Left pane

Computer Science & Information Technology

Biometric applications are generally categorized into three classifications:

A. citizen-dependent, customer-relations, employee-centric B. citizen-facing, customer-facing, employee-facing C. customer-relations, citizen-facing, sales-dependent D. citizen-facing, government-facing, business-dependent E. none of the above

Computer Science & Information Technology

. The accompanying figure illustrates the rule of ninths.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology