Q: 16
During the identification phase, it is discovered that port 23 is being used maliciously. Which of the
following system hardening techniques should be used to remediate the issue?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.