A security analyst is reviewing firewall logs while investigating a compromised web server. The following ports appear in the log:

A security analyst is reviewing firewall logs while investigating a compromised web server. The following ports appear in the log:

22, 25, 445, 1433, 3128, 3389, 6667
Which of the following protocols was used to access the server remotely?



A. LDAP
B. HTTP
C. RDP
D. HTTPS


Answer: C


Learn More :

SY0-401

Learn More Multiple Choice Question :