This review process depends on:

A computer is suspected of being compromised by malware. The security analyst examines the
computer and finds that a service called Telnet is running and connecting to an external website
over port 443. This Telnet service was found by comparing the system’s services to the list of
standard services on the company’s system image. This review process depends on:

A computer is suspected of being compromised by malware. The security analyst examines the
computer and finds that a service called Telnet is running and connecting to an external website
over port 443. This Telnet service was found by comparing the system’s services to the list of
standard services on the company’s system image. This review process depends on:

A.
MAC filtering.

B.
system hardening.

C.
rogue machine detection.

D.
baselining.

Explanation:



Leave a Reply 0

Your email address will not be published. Required fields are marked *