An organization has hired a penetration tester to test the security of its ten web servers. The penetration tester is able to gain root/administrative access in several servers by exploiting vulnerabilities associated with the implementation of SMTP, POP, DNS, FTP, Telnet, and IMAP.Which of the following recommendations should the penetration tester provide to the organization to better protect their web servers in the future?

A. Use a honeypot
B. Disable unnecessary services
C. Implement transport layer security
D. Increase application event logging

Answer: B. Disable unnecessary services

Computer Science & Information Technology

You might also like to view...

Tracer arrows show the relationship between ________ cells

A) active and reticent B) active and dependent C) active and related D) active and precedent

Computer Science & Information Technology

To insert clip art, click the Insert tab, and then, in the ____ group, click the Clip Art button.

A. Pages B. Insert C. Format D. Illustrations

Computer Science & Information Technology