A company has publicly hosted web applications and an internal Intranet protected by a firewall. Which
technique will help protect against enumeration?
A.
Reject all invalid email received via SMTP.
B.
Allow full DNS zone transfers.
C.
Remove A records for internal hosts.
D.
Enable null session pipes.