It is good practice to block ____ access to all internal servers from the public networks.
A. HTTP
B. Telnet
C. Simple Mail Transport Protocol
D. DNS
Answer: B
Computer Science & Information Technology
You might also like to view...
What exploit is used to elevate an attacker's permissions by inserting executable code in the computer's memory?
a. Trojan program b. Buffer overflow c. Ping of Death d. Buffer variance
Computer Science & Information Technology
What must developers enable on Android devices in order to install their applications?
a. ADTs b. Emulators c. Developer options d. Certificates
Computer Science & Information Technology