"Prioritizing Server Hardening for Enhanced Security - SY0-601 Exam Question Answer"

"Addressing the Highest Concern: Which Server Should be Prioritized First?"

Prev Question Next Question

Question

Audit logs from a small company's vulnerability scanning software show the following findings: Destinations scanned: -Server001- Internal human resources payroll server -Server101-Internet-facing web server -Server201- SQL server for Server101 -Server301-Jumpbox used by systems administrators accessible from the internal network Validated vulnerabilities found: -Server001- Vulnerable to buffer overflow exploit that may allow attackers to install software -Server101- Vulnerable to buffer overflow exploit that may allow attackers to install software -Server201-OS updates not fully current -Server301- Accessible from internal network without the use of jumpbox -Server301-Vulnerable to highly publicized exploit that can elevate user privileges Assuming external attackers who are gaining unauthorized information are of the highest concern, which of the following servers should be addressed FIRST?

Answers

Explanations

Click on the arrows to vote for the correct answer

A. B. C. D.

B.

The server that should be addressed first in this scenario is Server101, as it is the only server that is directly accessible from the internet-facing network.

The vulnerability scanning software identified that Server101 is vulnerable to a buffer overflow exploit that may allow attackers to install software, which could be used to gain unauthorized access to the system and potentially steal sensitive information.

While the other servers have identified vulnerabilities, they are not directly accessible from the internet and would require an attacker to gain access to the internal network first.

Therefore, addressing the vulnerabilities on Server101 is the most urgent and critical task, as it poses the greatest risk of unauthorized access and information theft. After addressing the vulnerabilities on Server101, the other servers can be addressed in order of their level of risk.

It is important to note that vulnerability scanning is only one aspect of a comprehensive security program, and regular updates and monitoring should be conducted to ensure ongoing security.