Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Actions that make a machine less susceptible to remote vulnerability exploit att

ID: 3866271 • Letter: A

Question

Actions that make a machine less susceptible to remote vulnerability exploit attacks: (circle all that apply)

Question 11 options:

verify the authenticity of all software being installed (e.g., use signing keys)

setup packet-filtering firewall on machine to block incoming access to (most) ports

install packet sniffing software on the machine

install a backdoor on the machine

setup the hosts access control files (tcpwrappers) for servers

run network IDS software like Snort

disable password-based authentication for the machine’s SSH server

test user passwords to make certain they are “strong”

disable server banners where possible

apply all patches available for installed software

A)

verify the authenticity of all software being installed (e.g., use signing keys)

B)

setup packet-filtering firewall on machine to block incoming access to (most) ports

C)

install packet sniffing software on the machine

D)

install a backdoor on the machine

E)

setup the hosts access control files (tcpwrappers) for servers

F)

run network IDS software like Snort

G)

disable password-based authentication for the machine’s SSH server

H)

test user passwords to make certain they are “strong”

I)

disable server banners where possible

J)

apply all patches available for installed software

Explanation / Answer

Actions that make a machine less susceptible to remote vulnerability exploit attacks:

A) verify the authenticity of all software being installed (e.g., use signing keys)

B) setup packet-filtering firewall on machine to block incoming access to (most) ports

E) setup the hosts access control files (tcpwrappers) for servers

F) run network IDS software like Snort

H) test user passwords to make certain they are “strong”

I) disable server banners where possible

J) apply all patches available for installed software

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote