This review process depends on:

A computer is suspected of being compromised by malware. The security analyst examines
the computer and finds that a service called Telnet is running and connecting to an external
website over port 443. This Telnet service was found by comparing the system’s services to
the list of standard services on the company’s system image. This review process depends
on:

A computer is suspected of being compromised by malware. The security analyst examines
the computer and finds that a service called Telnet is running and connecting to an external
website over port 443. This Telnet service was found by comparing the system’s services to
the list of standard services on the company’s system image. This review process depends
on:

A.
MAC filtering.

B.
system hardening.

C.
rogue machine detection.

D.
baselining.



Leave a Reply 0

Your email address will not be published. Required fields are marked *