A server administrator needs to harden a server by only allowing secure traffic and DNS inquiries.
A port scan reports the following ports are open:
A.
21 B.
22 C.
23 D.
53 E.
443 F.
636
D.
Reference: https://tools.cisco.com/security/center/resources/dns_best_practices.
A server administrator needs to harden a server by only allowing secure traffic and DNS inquiries.
A port scan reports the following ports are open:
A.
21
B.
22
C.
23
D.
53
E.
443
F.
636
D.
https://tools.cisco.com/security/center/resources/dns_best_practicesTo harden a server by only allowing secure traffic and DNS inquiries, the administrator needs to close all unnecessary ports that may pose a security risk.
A port scan reports that the following ports are open:
Based on this, the administrator should close port 21 and 23 and keep the rest of the ports open. By doing so, the server will only allow secure traffic and DNS inquiries, reducing the potential attack surface and enhancing security.
Additionally, the administrator can implement firewall rules to restrict inbound and outbound traffic to only the necessary ports and protocols, further reducing the risk of unauthorized access and data breaches.