A datacenter recently experienced a breach committed by a group that was able to access a server that had been shut down but not disconnected from the network. Which of the following could have prevented the breach from occurring?
A. Disabling WOL in the server BIOS
B. Shutting down unneeded ports on the server
C. Installing anti-malware software on the server
D. Disabling non-essential services on the server
Answer: A. Disabling WOL in the server BIOS
You might also like to view...
Exceptions can be used to indicate problems that occur when an object is being con- structed. Write a Python program that shows a constructor passing information about constructor fail- ure to an exception handler that occurs after a try statement. The exception raised also should contain the arguments sent to the constructor.
What will be an ideal response?
Software code known as a(n) cookie can allow an attacker to track a victim's activity on Web sites. _________________________
Answer the following statement true (T) or false (F)
With _____, business transactions are accumulated over a period of time for processing in a single unit.
A. online transaction processing systems B. real-time transaction processing systems C. on-demand processing systems D. batch processing systems
Use the ____ tab to change the layout of the panes in the Windows Live Mail window, sort or filter the current view or folder, or follow a conversation.
A. View B. Layout C. Display D. Presentation