A senior network security engineer has been tasked to decrease the attack surface of the corporate network. Which of the following actions would protect the
external network interfaces from external attackers performing network scanning?
A.
Remove contact details from the domain name registrar to prevent social engineering attacks.
B.
Test external interfaces to see how they function when they process fragmented IP packets.
C.
Enable a honeynet to capture and facilitate future analysis of malicious attack vectors.
D.
Filter all internal ICMP message traffic, forcing attackers to use full-blown TCP port scans against external network interfaces.