A company has been attacked and their website has been altered to display false information. The security administrator disables the web server service before restoring the website from backup. An audit was performed on the server and no other data was altered. Which of the following should be performed after the server has been restored?

A. Monitor all logs for the attacker's IP
B. Block port 443 on the web server
C. Install and configure SSL to be used on the web server
D. Configure the web server to be in VLAN 0 across the network

Answer: B. Block port 443 on the web server

Computer Science & Information Technology

You might also like to view...

Completing a mail merge in Word begins with clicking the ________ tab

Fill in the blank(s) with correct word

Computer Science & Information Technology

The principle of ________ strongly suggests that programs should execute with the least amount of privileges needed to complete their function.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology