Each correct answer represents a complete solution. Choose two.
Each correct answer represents a complete solution. Choose three.
He analyzes that the server's TCP ports 21, 25, 80, and 111 are open.
Which of the following security policies is the company using during this entire process to mitigate the risk of hacking attacks?