A network security engineer notices unusual traffic on the network from a single IP attempting to access systems on port 23. Port 23 is not used anywhere on the network. Which of the following should the engineer do to harden the network from this type of intrusion in the future?

A. Disable unnecessary services on servers
B. Disable unused accounts on servers and network devices
C. Implement password requirements on servers and network devices
D. Enable auditing on event logs

Answer: A. Disable unnecessary services on servers

Computer Science & Information Technology

You might also like to view...

In companies, Access is usually used to access tables contained in central systems, called ________

Fill in the blank(s) with correct word

Computer Science & Information Technology

Joe, a network technician, is tasked with installing a router and firewall to get an office working with internet access. Which of the following features MUST be configured to allow sharing of a single public IP address?

A) POP3 B) QoS C) SMTP D) PAT

Computer Science & Information Technology