A security analyst scans a company's public network and discovers a host is running a remote desktop that can be used to access the production network. Which of the following changes should the security analyst recommend?
Connecting the remote server to the domain sounds like it could improve security, but I wonder if increasing the password length is really sufficient without other measures.
I think setting up a VPN is a solid recommendation. It was a similar scenario in one of our practice questions, and it really adds a layer of security.
Easy peasy! Placing the jump server inside the firewall and setting up a VPN is the clear winner here. That will help secure the connection and prevent unauthorized access to the production network.
I'm a little confused by this question. Connecting the remote server to the domain and increasing the password length doesn't seem like it would fully address the security issue here. I'll have to think this through carefully.
Ah, I know this type of question. The key is to isolate the remote desktop server from the production network. Setting up a VPN and putting the jump server inside the firewall is definitely the way to go.
Hmm, I'm a bit unsure about this one. Changing the remote desktop port or using a proxy could also be good options, but I'm not sure which would be the best recommendation.
This seems like a straightforward security question. I'd recommend setting up a VPN and placing the jump server inside the firewall to better secure the connection.
I think the key here is understanding what privileges are required for a secure view to reference data across multiple databases. The options mention CREATE_SHARE, SHARE, SELECT, and REFERENCE_USAGE, so I'll need to carefully consider which one is the most appropriate.
Guys, I hate to be that person, but have you considered option D? Connecting the remote server to the domain and increasing the password length could be a simple yet effective way to tighten security. Just a thought.
Ah, I see where you're coming from, but I think option C is the way to go. Using a proxy for the web connections from the remote desktop server could help monitor and control the traffic, without the overhead of a full VPN setup.
Hmm, I see what you mean, but I'm not sure a VPN is the best solution here. Changing the port to a non-standard number (option A) could be a quick fix and make it harder for attackers to find the remote desktop.
This is a tricky one. The remote desktop access is a major security risk, so we need to take decisive action. I'm leaning towards option B - setting up a VPN and placing the jump server inside the firewall. That way, we can control and monitor the connection more effectively.
upvoted 0 times
...
Log in to Pass4Success
Sign in:
Report Comment
Is the comment made by USERNAME spam or abusive?
Commenting
In order to participate in the comments you need to be logged-in.
You can sign-up or
login
Mollie
3 months agoClarence
3 months agoFausto
3 months agoBlair
4 months agoCelestina
4 months agoEvangelina
4 months agoEric
4 months agoAdaline
4 months agoKina
5 months agoCamellia
5 months agoHannah
5 months agoAmber
5 months agoBen
5 months agoElke
5 months agoSteffanie
5 months agoTyra
5 months agoTawanna
2 years agoLeonie
2 years agoClemencia
2 years agoDelila
2 years agoIdella
2 years agoAgustin
2 years agoDanilo
2 years agoBuddy
2 years agoJohana
2 years agoTracey
2 years agoKarl
2 years ago