An organization has hired a penetration tester to test the security of its ten web servers. The penetration tester is able to gain root/administrative access in several servers by exploiting vulnerabilities associated with the implementation of SMTP, POP, DNS, FTP, Telnet, and IMAP.Which of the following recommendations should the penetration tester provide to the organization to better protect their web servers in the future?
A. Use a honeypot
B. Disable unnecessary services
C. Implement transport layer security
D. Increase application event logging
Answer: B. Disable unnecessary services
You might also like to view...
Answer the following statements true (T) or false (F)
1. The optimization of tonal adjustment at the time of capturing images—scanning or digital photography—does not matter because you can always extend the tonal range of the image to any extent afterward in Photoshop to recover the missing color information. 2. Zero decibels is when there is absence of sound or no sound wave. 3. Eight-bit sound is generally considered to be more than adequate for recording music. 4. MP3 is a good file format to keep as a source file for further editing. 5. The optimal meter level for recording is going past the red area of the meter.
Element names may not contain _____.
A. letters B. the string "xml" C. blank spaces D. the underscore character
You can set up Facebook to ignore applications initiated by specific friends.
Answer the following statement true (T) or false (F)
Critical Thinking Questions Case Study 7-1 ? Your neighbor is using her computer to buy gifts for her teenage son. There is only one family computer and she wants to keep the gifts a surprise. She seeks out your help.? She also asks you how to share the webpages she has visited so other family can order gifts too. You tell her to a. Double-click the web page. b. Click the 'Save and Send' button on the toolbar. c. Click the Share button on the address bar. d. Double-click the Share button on the taskbar.?
What will be an ideal response?