A datacenter recently experienced a breach committed by a group that was able to access a server that had been shut down but not disconnected from the network. Which of the following could have prevented the breach from occurring?

A. Disabling WOL in the server BIOS
B. Shutting down unneeded ports on the server
C. Installing anti-malware software on the server
D. Disabling non-essential services on the server


Answer: A. Disabling WOL in the server BIOS

Computer Science & Information Technology

You might also like to view...

Exceptions can be used to indicate problems that occur when an object is being con- structed. Write a Python program that shows a constructor passing information about constructor fail- ure to an exception handler that occurs after a try statement. The exception raised also should contain the arguments sent to the constructor.

What will be an ideal response?

Computer Science & Information Technology

Software code known as a(n) cookie can allow an attacker to track a victim's activity on Web sites. _________________________

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

With _____, business transactions are accumulated over a period of time for processing in a single unit.

A. online transaction processing systems B. real-time transaction processing systems C. on-demand processing systems D. batch processing systems

Computer Science & Information Technology

Use the ____ tab to change the layout of the panes in the Windows Live Mail window, sort or filter the current view or folder, or follow a conversation.

A. View B. Layout C. Display D. Presentation

Computer Science & Information Technology