Does anyone know the answer to the following question:
Analysis of a recent security breach at an organization revealed that the attack leveraged a telnet server that had not been used for some time. Below are partial results of an audit that occurred a week before the breach was detected.
OPEN PORTS---TCP 23, TCP 80, TCP 443
OS PATCH LEVEL-CURRENT
PASSWORD AUDIT-PASS, STRONG
FILE INTEGRITY-PASS
Which of the following could have mitigated or deterred this breach?
- Routine patch management on the server
- Greater frequency of auditing server logs
- Password protection on the telnet server
- Disabling unnecessary services