You are writing security policy that hardens and prevents Footprinting attempt by Hackers. Which
of the following countermeasures will NOT be effective against this attack?
A.
Configure routers to restrict the responses to Footprinting requests
B.
Configure Web Servers to avoid information leakage and disable unwanted protocols
C.
Lock the ports with suitable Firewall configuration
D.
Use an IDS that can be configured to refuse suspicious traffic and pick up Footprinting patterns
E.
Evaluate the information before publishing it on the Website/Intranet
F.
Monitor every employee computer with Spy cameras, keyloggers and spy on them
G.
Perform Footprinting techniques and remove any sensitive information found on DMZ sites
H.
Prevent search engines from caching a Webpage and use anonymous registration services
I.
Disable directory and use split-DNS