Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: validbest

Exam GCIH All Questions
Exam GCIH All Questions

View all questions & answers for the GCIH exam

GIAC Security Administration GCIH Question # 76 Topic 8 Discussion

GCIH Exam Topic 8 Question 76 Discussion:
Question #: 76
Topic #: 8

John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. The company is aware of various types of security attacks and wants to impede them. Hence, management has assigned John a project to port scan the company's Web Server. For this, he uses the nmap port scanner and issues the following command to perform idle port scanning:

nmap -PN -p- -sI IP_Address_of_Company_Server

He analyzes that the server's TCP ports 21, 25, 80, and 111 are open.

Which of the following security policies is the company using during this entire process to mitigate the risk of hacking attacks?


A.

Non-disclosure agreement


B.

Antivirus policy


C.

Acceptable use policy


D.

Audit policy


Get Premium GCIH Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.