Which of the following must you do to create a cheroot jail?
A.
Track all attempted connections.
B.
Block all connections that appear suspicious.
C.
Create a dedicated subdirectory that contains all referenced applications.
D.
Log all attempted attacks into a database and then regularly verify the contents of the
database.
Explanation: