Explain configuration is indicative of potential compromise

Assignment Help Basic Computer Science
Reference no: EM133309117

Assignment:

Question. John, a security analyst has done a regular check on the ports open on a mission critical server and has found that 4 ports were open: 21, 22, 443, and 3389. A week later, the analyst found that two additional ports were open on the server: 53 and 500.

i. Explain whether or not the server's updated configuration is indicative of a potential compromise.

ii. Explain which services you recommend being turned off to improve the security posture of the server. Your answer must justify your port selection in the context that turning off services may result in the server not being able to meet its core requirements (simply turning off services DOES have an impact).

Reference no: EM133309117

Questions Cloud

Explain concepts in the foundations of logic programing : Explain the following concepts in the foundations of logic programing: functors, logic variables, unification, predicates, and backtracking search.
Discuss implementing a dynamic branch predictor : Instead of using the static predict not-taken scheme for conditional branch instructions we could consider implementing a dynamic branch predictor.
Define digital transformation : How do you define digital transformation and digitalization and what is the difference? What is the impact of digital transformation on ITIIS projects?
Discuss the value of social media : Discussed as the value of social media. There are many significant pros and cons of social media that people have become tremendously passionate about it.
Explain configuration is indicative of potential compromise : Explain whether or not the server's updated configuration is indicative of a potential compromise.
What are the four shifts of giftivism : What are the four shifts of Giftivism? What is hindering me from practicing kindness and generosity?
What will be your search strategy : What is research, and list 3 activities that a community service worker could undertake to research of an identified issue?
Explore your own occupational selection and development : How have work-family conflicts played out in the lives of your parents or caregivers? Think back to the conversations, negotiations, and, perhaps
How likely did the reaction occur because of the medication : How likely did the reaction occur because of the medication? Were there any other possible reasons the reaction might have occurred? Was the reaction reported?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Job during the recession

Matthew was fired from his job during the recession. This is an example of

  Measuring return on investment

What are the ethical problems involved in outsourcing and can we ignore the ethical issues involved in outsourcing?

  Risk management plan

A section titled Introduction discussing the purpose of the plan. You must include details from the scenario, above, describing the environment.

  Stakeholder engagement

Discussed importance of stakeholder engagement in policy making. The author presented several benefits and analysis of cases in which stakeholder engagement.

  Any reason other than listen queue being full on the server

In the Internet File Server example (Figure 6-6), can the connect( ) system call on theclient fail for any reason other than listen queue being full on the server

  Differences between an misd and simd machine

Discuss the similarities and differences between an MISD and SIMD machine. Answer this question in terms of data-level parallelism.

  Lack of religious icons take away from spiritual experience

Does the lack of religious icons take away from the spiritual experience? Why or why not? Why do some religions forbid depictions of their deities while others

  Costs of compromised data integrity breaches

Discuss the risk and costs of compromised data integrity breaches. Focus on integrity not confidentiality. Look at military, education,

  Evaluate the history of cryptography

You will evaluate the history of cryptography from its origins. Analyze how cryptography was used and describe how it grew within history

  Find the smallest k values in an array of records

Modify Quicksort to find the smallest K values in an array of records. Your output should be the array modified so that the K smallest values are sorted in the first K positions of the array. Your algorithm should do the minimum amount of work nec..

  The cloud is elastic leasing of pooled computer resources

ISM 3004-The cloud is elastic leasing of pooled computer resources over Internet. Many organizations have begun to move their computing infrastructure to cloud

  The components for forensic workstation

When choosing the components for a forensic workstation there are many elements to consider including hardware, software, and peripherals.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd