A datacenter recently experienced a breach committed by a group that was able to access a server that had been shut down but not disconnected from the network.
Which of the following could have prevented the breach from occurring?
Click on the arrows to vote for the correct answer
A. B. C. D.A.
The scenario describes a security breach that occurred due to a server being shut down but not disconnected from the network. To prevent such an incident from happening in the future, the following actions could be taken:
A. Disabling WOL in the server BIOS: Wake-on-LAN (WOL) is a feature that allows a computer to be powered on remotely over the network. If WOL is enabled on the server BIOS, an attacker could potentially power on the server remotely and gain access to it. Disabling WOL in the BIOS would prevent this from happening.
B. Shutting down unneeded ports on the server: If there are any ports on the server that are not needed for its operation, they should be shut down. This would limit the attack surface and make it more difficult for an attacker to gain access to the server.
C. Installing anti-malware software on the server: Anti-malware software can help detect and prevent malicious software from infecting the server. If the server had been infected with malware, it could have provided an entry point for the attackers to gain access to the system.
D. Disabling non-essential services on the server: If there are any services running on the server that are not essential for its operation, they should be disabled. This would limit the attack surface and make it more difficult for an attacker to gain access to the server.
Out of these options, options A, B, and D are all potential solutions to preventing the described breach. Option C is less likely to be directly relevant in this specific scenario, but it is still a good practice to install anti-malware software on servers to prevent other types of attacks.