Web servers are often the most targeted and attacked hosts on organizations’ networks. Attackers may exploit software bugs in the Web server, underlying operating system, or active content to gain unauthorized access.
Identify the correct statement related to the above Web Server installation?
A.
Lack of proper security policy, procedures and maintenance
B.
Bugs in server software, OS and web applications
C.
Installing the server with default settings
D.
Unpatched security flaws in the server software, OS and applications
c