An organization has hired a penetration tester to test the security of its ten web servers. The penetration tester is able to gain root/administrative access in several servers by exploiting vulnerabilities associated with the implementation of SMTP, POP, DNS, FTP, Telnet, and IMAP.Which of the following recommendations should the penetration tester provide to the organization to better protect their web servers in the future?
A. Use a honeypot
B. Disable unnecessary services
C. Implement transport layer security
D. Increase application event logging
Answer: B. Disable unnecessary services
Computer Science & Information Technology
You might also like to view...
Tracer arrows show the relationship between ________ cells
A) active and reticent B) active and dependent C) active and related D) active and precedent
Computer Science & Information Technology
To insert clip art, click the Insert tab, and then, in the ____ group, click the Clip Art button.
A. Pages B. Insert C. Format D. Illustrations
Computer Science & Information Technology