A security analyst is reviewing firewall logs while investigating a compromised web server. The following ports appear in the log: 22, 25, 445, 1433, 3128, 3389, 6667 Which of the following protocols was used to access the server remotely?
A. LDAP
B. HTTP
C. RDP
D. HTTPS
Answer: C. RDP
You might also like to view...
You can subtly mask or show non-destructive filters using the ____ mask in conjunction with the Brush tool, a gradient, etc.
A. motion B. filter C. spot D. shadow
Which PowerPoint screen element displays a large image of the active slide?
A) Slide pane B) Status bar C) Notes pane D) Left pane
Biometric applications are generally categorized into three classifications:
A. citizen-dependent, customer-relations, employee-centric B. citizen-facing, customer-facing, employee-facing C. customer-relations, citizen-facing, sales-dependent D. citizen-facing, government-facing, business-dependent E. none of the above
. The accompanying figure illustrates the rule of ninths.
Answer the following statement true (T) or false (F)