CEH Certified Ethical Hacker (312-50v9)
Question No. 1
While examining audit logs, you discover that people are able to telnet into the SMTP server on port 25. You would like to block this, though you do not see any evidence of an attack or other wrong doing. However, you are concerned about affecting the normal functionality of the email server. From the following options choose how best you can achieve this objective?
Choose the correct option from the given list.
01 / 614