A security analyst is reviewing firewall logs while investigating a compromised web server.
The following ports appear in the loG.
22, 25, 445, 1433, 3128, 3389, 6667
Which of the following protocols was used to access the server remotely?
A.
LDAP
B.
HTTP
C.
RDP
D.
HTTPS