When examining the server’s list of protocols that are bound and active on each network interface card, the network administrator notices a relatively large number of protocols. Which actions should be taken to ensure network security?
A.
Unnecessary protocols do not pose a significant to the system and should be left intact for compatibility reasons.
B.
There are no unneeded protocols on most systems because protocols are chosen during the installation.
C.
Unnecessary protocols should be disable on all server and client machines on a network as they pose great risk.
D.
Using port filtering ACLs (Access Control List) at firewalls and routers is sufficient to stop malicious attacks on unused protocols.
Explanation:
Leaving additional network services enabled may cause difficulties and can create vulnerabilities in your network. As much as possible, configure your network devices as restrictively as you can.
Reference: Security + (SYBEX) page 235