Here’s the Answer to the Question posted on Facebook
Q. One of your web servers was recently attacked and you have been tasked with reviewing firewall logs to see if you can determine how an attacker accessed the system remotely. You identified the following port numbers in log entries: 21, 22, 25, 53, 80, 110, 443, and 3389. Which of the following protocols did the attacker MOST likely use?
Answer available until December 7, 2015.
|Get over 400 Security+ (SY0-401 questions here).|
See Chapter 3 of the CompTIA Security+: Get Certified Get Ahead: SY0-401 Study Guide.