Why should you secure open ports?
What will be an ideal response?
Because an open port is an open door and can be used by an attacker to send commands to a computer, potentially gain access to a server, and possibly exert control over a networking device. The general rule is to remove from service or at least secure any port not absolutely necessary to conducting business. For example, if a business doesn't host Web services, there is no need for port 80 to be available on its servers.
You might also like to view...
____ is a protocol that works with TCP/IP to get Web resources to your desktop.
A. HTML B. HTTP C. A Web browser D. A URL
Instantiating an object from a constructor functionresults in efficient use of memory and resources.
Answer the following statement true (T) or false (F)
What are the primary mechanisms for financial institutions to comply with the Bank Secrecy Act?
A. Currency Transaction Reports and Suspicious Activity Reports B. Currency Transaction Reports and Compliance Audits C. Compliance Audits Suspicious Activity Reports D. Information Security Audits and Compliance Reports
In the LC-2200 architecture, where are operands normally found for an add instruction?
What will be an ideal response?