ECCouncil Ethical Hacking and Countermeasures V8 EC0-350 Question # 100 Topic 11 Discussion

ECCouncil Ethical Hacking and Countermeasures V8 EC0-350 Question # 100 Topic 11 Discussion

EC0-350 Exam Topic 11 Question 100 Discussion:
Question #: 100
Topic #: 11

Rebecca has noted multiple entries in her logs about users attempting to connect on ports that are either not opened or ports that are not for public usage. How can she restrict this type of abuse by limiting access to only specific IP addresses that are trusted by using one of the built-in Linux Operating System tools?


A.

Ensure all files have at least a 755 or more restrictive permissions.


B.

Configure rules using ipchains.


C.

Configure and enable portsentry on his server.


D.

Install an intrusion detection system on her computer such as Snort.


Get Premium EC0-350 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.