Which item accurately describes a security weakness that is caused by implementing a “ports first” data security solution in a traditional data center?
- You may have to use port numbers greater than 1024 for your business-critical applications.
- You may have to open up multiple ports and these ports could also be used to gain unauthorized entry into your datacenter.
- You may not be able to assign the correct port to your business-critical applications.
- You may not be able to open up enough ports for your business-critical applications which will increase the attack surface area.