medium
Single Answer
0

Ryan needs to verify that no unnecessary ports and services are available on his systems, but he cannot run a vulnerability scanner. What is his best option?

Answer Options

A

Passive network traffic capture to detect services

B

A configuration review

C

Active network traffic capture to detect services

D

Log review

Correct Answer: B

Explanation

Configuration reviews, either using automated tool or manual validation, can be a useful proactive way to ensure that unnecessary ports and services are not accessible. Configuration management tools can also help ensure that expected configurations are in place. Neither passive nor active network packet capture will show services that are not accessed, meaning that open ports could be missed, and log review won't show all open ports either.