A security analyst wishes to increase the security of an FTP server. Currently, all traffic to the FTP server is unencrypted. Users connecting to the FTP server use a variety of modern FTP client software.The security analyst wants to keep the same port and protocol, while also still allowing unencrypted connections. Which of the following would BEST accomplish these goals?
A. Require the SFTP protocol to connect to the file server.
B. Use implicit TLS on the FTP server.
C. Use explicit FTPS for connections.
D. Use SSH tunneling to encrypt the FTP traffic.
Ans: C. Use explicit FTPS for connections.
You might also like to view...
What is a key advantage of interpreters over compilers? What is a key disadvantage?
What will be an ideal response?
Which of the following is NOT true about privacy?
A) Many Facebook applications work by accessing your private information and the private information of your friends. B) At the very least, you probably want to keep from posting an image. C) Making all your information public makes it easier for advertisers, spammers, and scammers to target you with all manner of unwanted solicitations. D) Criminals can peruse your Timeline page to find out when you're away from home, thus targeting your empty house or apartment for a burglary.
The ________ method of depreciation calculates depreciation at the highest accelerated rate
A) accumulated B) double declining-balance C) declining-balance D) straight-line
A ____ is a data structure that stores information about a nonterminal, such as the actual name of the object and its data type.
A. rule B. production C. parse tree D. semantic record