It is good practice to block ____ access to all internal servers from the public networks.

A. HTTP
B. Telnet
C. Simple Mail Transport Protocol
D. DNS

Answer: B

Computer Science & Information Technology

You might also like to view...

What exploit is used to elevate an attacker's permissions by inserting executable code in the computer's memory?

a. Trojan program b. Buffer overflow c. Ping of Death d. Buffer variance

Computer Science & Information Technology

What must developers enable on Android devices in order to install their applications?

a. ADTs b. Emulators c. Developer options d. Certificates

Computer Science & Information Technology