A company has been attacked and their website has been altered to display false information. The security administrator disables the web server service before restoring the website from backup. An audit was performed on the server and no other data was altered. Which of the following should be performed after the server has been restored?
A. Monitor all logs for the attacker's IP
B. Block port 443 on the web server
C. Install and configure SSL to be used on the web server
D. Configure the web server to be in VLAN 0 across the network
Answer: B. Block port 443 on the web server
Computer Science & Information Technology
You might also like to view...
Completing a mail merge in Word begins with clicking the ________ tab
Fill in the blank(s) with correct word
Computer Science & Information Technology
The principle of ________ strongly suggests that programs should execute with the least amount of privileges needed to complete their function.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology