A company has publicly hosted web applications and an internal Intranet protected by a firewall.
Which technique will help protect against enumeration?
A.
Reject all invalid email received via SMTP.
B.
Allow full DNS zone transfers.
C.
Remove A records for internal hosts.
D.
Enable null session pipes.