John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. The company is aware of various types of security attacks and wants to impede them. Hence, management has assigned John a project to port scan the company's Web Server. For this, he uses the nmap port scanner and issues the following command to perform idle port scanning:
nmap -PN -p- -sI IP_Address_of_Company_Server
He analyzes that the server's TCP ports 21, 25, 80, and 111 are open.
Which of the following security policies is the company using during this entire process to mitigate the risk of hacking attacks?
Craig
3 months agoWinifred
3 months agoShenika
3 months agoEveline
4 months agoHelga
4 months agoBernardo
4 months agoTerry
4 months agoHarrison
4 months agoMose
5 months agoHeike
5 months agoVanda
5 months agoLatanya
5 months agoAmie
5 months agoLanie
5 months agoSommer
5 months agoEmilio
5 months agoAshton
10 months agoMi
8 months agoCristy
8 months agoLuis
9 months agoAnnice
10 months agoKris
9 months agoGeoffrey
9 months agoShelba
9 months agoTamra
10 months agoDarell
8 months agoTalia
9 months agoQuentin
9 months agoChan
10 months agoArgelia
9 months agoNohemi
9 months agoLettie
9 months agoMozelle
10 months agoSalome
11 months agoAmos
11 months agoSommer
11 months ago