Unauthorized Servers on University Network: Threat Identification | Exam SY0-601

Unauthorized Servers on University Network

Prev Question Next Question

Question

The IT department at a university is concerned about professors placing servers on the university network in an attempt to bypass security controls.

Which of the following BEST represents this type of threat?

A.

A script kiddie B.

Shadow IT C.

Hacktivism D.

White-hat.

B.

Explanations

The IT department at a university is concerned about professors placing servers on the university network in an attempt to bypass security controls.

Which of the following BEST represents this type of threat?

A.

A script kiddie

B.

Shadow IT

C.

Hacktivism

D.

White-hat.

B.

The best option that represents the type of threat posed by professors placing servers on the university network in an attempt to bypass security controls is B. Shadow IT.

Shadow IT refers to the use of hardware, software, or services that are not approved or managed by an organization's IT department. In this case, the professors are setting up servers on the university network without the approval or knowledge of the IT department. This can pose a significant security risk because the IT department may not be aware of the servers and the security controls that need to be put in place to protect them. Additionally, the servers may not be configured properly, leaving them vulnerable to attacks.

Script kiddies, hacktivism, and white-hats are not the best options that represent the type of threat in this scenario. A script kiddie is someone who uses existing software tools to launch attacks without any real understanding of how the tools work. Hacktivism refers to the use of hacking or cyberattacks for political or social causes. White-hats are individuals who use their hacking skills to help organizations identify and fix vulnerabilities in their systems.

In summary, the best option that represents the type of threat posed by professors placing servers on the university network in an attempt to bypass security controls is shadow IT. This type of threat can lead to security vulnerabilities that can be exploited by attackers, so it is important for organizations to have policies in place to prevent shadow IT and ensure that all hardware, software, and services are approved and managed by the IT department.