Which of the following is the MOST likely mitigation for this reported item?

An outside organization has completed a penetration test for a company. One of the items on the
report is reflecting the ability to read SSL traffic from the web server. Which of the following is the
MOST likely mitigation for this reported item?

An outside organization has completed a penetration test for a company. One of the items on the
report is reflecting the ability to read SSL traffic from the web server. Which of the following is the
MOST likely mitigation for this reported item?

A.
Ensure patches are deployed

B.
Install an IDS on the network

C.
Configure the firewall to block traffic on port 443

D.
Implement a VPN for employees

Explanation:



Leave a Reply 9

Your email address will not be published. Required fields are marked *


Asir Mufti

Asir Mufti

answer is not making sense , what is the grantee that a deployed patch will resolve the problem

Aspartame

Aspartame

A is correct. The other choices don’t make sense. Generally, a patch can fix a vulnerability – which in this case was most likely the reason that the pen testers were able to read SSL traffic.

Google

Google

The info mentioned in the report are some of the most beneficial offered.

Download PC Games

Download PC Games

the time to read or check out the subject material or sites we have linked to beneath the

Convert your video files here

Convert your video files here

Sites of interest we have a link to

casino

casino

Here is a superb Weblog You might Find Intriguing that we Encourage You

Computer Repair

Computer Repair

one of our visitors recently recommended the following website

stay at home mom jobs

stay at home mom jobs

Wonderful story, reckoned we could combine a number of unrelated information, nonetheless truly really worth taking a search, whoa did 1 learn about Mid East has got far more problerms as well

インフルエンザ

インフルエンザ

check beneath, are some absolutely unrelated internet sites to ours, having said that, they are most trustworthy sources that we use