Your online bookstore has customers connecting to a variety of Web servers to place or change
orders, and check order status. You ran penetration tests through the Security Gateway, to
determine if the Web servers were protected from a recent series of cross-site scripting attacks.
The penetration testing indicated the Web servers were still vulnerable. You have checked every
box in the Web Intelligence tab, and installed the Security Policy. What else might you do to
reduce the vulnerability?
A.
Configure the Security Gateway protecting the Web servers as a Web server.
B.
Check the “Products > Web Server” box on the host node objects representing your Web
servers.
C.
Configure resource objects as Web servers, and use them in the rules allowing HTTP traffic to
the Web servers.
D.
The penetration software you are using is malfunctioning and is reporting a false-positive.