Actions that make a machine less susceptible to remote vulnerability exploit att
ID: 3866271 • Letter: A
Question
Actions that make a machine less susceptible to remote vulnerability exploit attacks: (circle all that apply)
Question 11 options:
verify the authenticity of all software being installed (e.g., use signing keys)
setup packet-filtering firewall on machine to block incoming access to (most) ports
install packet sniffing software on the machine
install a backdoor on the machine
setup the hosts access control files (tcpwrappers) for servers
run network IDS software like Snort
disable password-based authentication for the machine’s SSH server
test user passwords to make certain they are “strong”
disable server banners where possible
apply all patches available for installed software
A)verify the authenticity of all software being installed (e.g., use signing keys)
B)setup packet-filtering firewall on machine to block incoming access to (most) ports
C)install packet sniffing software on the machine
D)install a backdoor on the machine
E)setup the hosts access control files (tcpwrappers) for servers
F)run network IDS software like Snort
G)disable password-based authentication for the machine’s SSH server
H)test user passwords to make certain they are “strong”
I)disable server banners where possible
J)apply all patches available for installed software
Explanation / Answer
Actions that make a machine less susceptible to remote vulnerability exploit attacks:
A) verify the authenticity of all software being installed (e.g., use signing keys)
B) setup packet-filtering firewall on machine to block incoming access to (most) ports
E) setup the hosts access control files (tcpwrappers) for servers
F) run network IDS software like Snort
H) test user passwords to make certain they are “strong”
I) disable server banners where possible
J) apply all patches available for installed software
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.