New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

CompTIA SY0-701 Exam - Topic 1 Question 4 Discussion

Actual exam question for CompTIA's SY0-701 exam
Question #: 4
Topic #: 1
[All SY0-701 Questions]

A security analyst scans a company's public network and discovers a host is running a remote desktop that can be used to access the production network. Which of the following changes should the security analyst recommend?

Show Suggested Answer Hide Answer

Contribute your Thoughts:

0/2000 characters
Mollie
3 months ago
I think increasing password length is a good idea too.
upvoted 0 times
...
Clarence
3 months ago
Surprised they even had RDP exposed like that!
upvoted 0 times
...
Fausto
3 months ago
A proxy could help, but it's not the main fix here.
upvoted 0 times
...
Blair
4 months ago
Changing the port? That's just security through obscurity.
upvoted 0 times
...
Celestina
4 months ago
Definitely a VPN is the way to go!
upvoted 0 times
...
Evangelina
4 months ago
Connecting the remote server to the domain sounds like it could improve security, but I wonder if increasing the password length is really sufficient without other measures.
upvoted 0 times
...
Eric
4 months ago
I’m a bit confused about using a proxy for web connections. I don’t recall if that directly addresses the remote desktop issue.
upvoted 0 times
...
Adaline
4 months ago
I think setting up a VPN is a solid recommendation. It was a similar scenario in one of our practice questions, and it really adds a layer of security.
upvoted 0 times
...
Kina
5 months ago
I remember we discussed how changing the remote desktop port might help, but I'm not sure if it's enough on its own.
upvoted 0 times
...
Camellia
5 months ago
Easy peasy! Placing the jump server inside the firewall and setting up a VPN is the clear winner here. That will help secure the connection and prevent unauthorized access to the production network.
upvoted 0 times
...
Hannah
5 months ago
I'm a little confused by this question. Connecting the remote server to the domain and increasing the password length doesn't seem like it would fully address the security issue here. I'll have to think this through carefully.
upvoted 0 times
...
Amber
5 months ago
Ah, I know this type of question. The key is to isolate the remote desktop server from the production network. Setting up a VPN and putting the jump server inside the firewall is definitely the way to go.
upvoted 0 times
...
Ben
5 months ago
Hmm, I'm a bit unsure about this one. Changing the remote desktop port or using a proxy could also be good options, but I'm not sure which would be the best recommendation.
upvoted 0 times
...
Elke
5 months ago
This seems like a straightforward security question. I'd recommend setting up a VPN and placing the jump server inside the firewall to better secure the connection.
upvoted 0 times
...
Steffanie
5 months ago
I think the key here is understanding what privileges are required for a secure view to reference data across multiple databases. The options mention CREATE_SHARE, SHARE, SELECT, and REFERENCE_USAGE, so I'll need to carefully consider which one is the most appropriate.
upvoted 0 times
...
Tyra
5 months ago
Hmm, I'm not entirely sure about this one. I'll have to think it through carefully before selecting an answer.
upvoted 0 times
...
Tawanna
2 years ago
Guys, I hate to be that person, but have you considered option D? Connecting the remote server to the domain and increasing the password length could be a simple yet effective way to tighten security. Just a thought.
upvoted 0 times
...
Leonie
2 years ago
Ah, I see where you're coming from, but I think option C is the way to go. Using a proxy for the web connections from the remote desktop server could help monitor and control the traffic, without the overhead of a full VPN setup.
upvoted 0 times
...
Clemencia
2 years ago
Hmm, I see what you mean, but I'm not sure a VPN is the best solution here. Changing the port to a non-standard number (option A) could be a quick fix and make it harder for attackers to find the remote desktop.
upvoted 0 times
Delila
2 years ago
Let's go with changing the port to a non-standard number as the recommended change for now.
upvoted 0 times
...
Idella
2 years ago
I agree, it's a quick fix that could make it harder for attackers to gain unauthorized access.
upvoted 0 times
...
Agustin
2 years ago
I think changing the port to a non-standard number is a good first step to take in securing the remote desktop.
upvoted 0 times
...
Danilo
2 years ago
Connecting the remote server to the domain and increasing the password length could make it more secure, too.
upvoted 0 times
...
Buddy
2 years ago
Using a proxy for web connections from the remote desktop server could also help mask the server's location.
upvoted 0 times
...
Johana
2 years ago
But setting up a VPN and placing the jump server inside the firewall might add an extra layer of protection.
upvoted 0 times
...
Tracey
2 years ago
I agree, changing the port to a non-standard number could definitely help increase security.
upvoted 0 times
...
...
Karl
2 years ago
This is a tricky one. The remote desktop access is a major security risk, so we need to take decisive action. I'm leaning towards option B - setting up a VPN and placing the jump server inside the firewall. That way, we can control and monitor the connection more effectively.
upvoted 0 times
...

Save Cancel