Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

CompTIA Exam CS0-003 Topic 3 Question 35 Discussion

Actual exam question for CompTIA's CS0-003 exam
Question #: 35
Topic #: 3
[All CS0-003 Questions]

A security analyst runs the following command:

# nmap -T4 -F 192.168.30.30

Starting nmap 7.6

Host is up (0.13s latency)

PORT STATE SERVICE

23/tcp open telnet

443/tcp open https

636/tcp open ldaps

Which of the following should the analyst recommend first to harden the system?

Show Suggested Answer Hide Answer
Suggested Answer: A

Comprehensive Detailed

The nmap scan results show that Telnet (port 23) is open. Telnet transmits data, including credentials, in plaintext, which is insecure and should be disabled to enhance security. Here's an explanation of each option:

A . Disable all protocols that do not use encryption

Disabling unencrypted protocols (such as Telnet) reduces exposure to man-in-the-middle (MITM) attacks and credential sniffing. Telnet should be replaced with a secure protocol like SSH, which provides encryption for transmitted data.

B . Configure client certificates for domain services

While client certificates enhance authentication security, they are more relevant to services like LDAP over SSL (port 636), which is already secure. This would not address the Telnet vulnerability.

C . Ensure that this system is behind a NGFW

A Next-Generation Firewall (NGFW) provides enhanced network security, but it may not mitigate the risks of unencrypted protocols if they are allowed internally.

D . Deploy a publicly trusted root CA for secure websites

Public root CAs are used for website authentication and encryption, relevant only if this system is hosting a publicly accessible HTTPS service. It would not impact Telnet security.


CIS Controls: Recommendations on secure configurations, especially the use of encrypted protocols.

NIST SP 800-47: Security considerations for network protocols, emphasizing encrypted alternatives like SSH over Telnet.

Contribute your Thoughts:

Evangelina
1 months ago
I think option C) Ensure that this system is behind a NGFW is also crucial for added protection.
upvoted 0 times
...
Major
2 months ago
I agree with Amie. It's important to prioritize security by disabling unencrypted protocols.
upvoted 0 times
...
Stephaine
2 months ago
Client certificates? That's some hardcore security stuff right there. I bet the analyst's fingers are gonna be cramping up just trying to configure that.
upvoted 0 times
...
Ethan
2 months ago
Nah, man, I'd go for the NGFW option. That'll give you a solid firewall to block all the bad stuff before it even gets to the system.
upvoted 0 times
Barabara
22 days ago
D) Deploy a publicly trusted root CA for secure websites.
upvoted 0 times
...
Lisbeth
24 days ago
C) Ensure that this system is behind a NGFW.
upvoted 0 times
...
Adell
27 days ago
B) Configure client certificates for domain services.
upvoted 0 times
...
Gail
1 months ago
A) Disable all protocols that do not use encryption.
upvoted 0 times
...
...
Leila
2 months ago
Definitely, the first thing to do is disable all the unencrypted protocols like telnet. Gotta keep that data secure, yo!
upvoted 0 times
Vallie
23 days ago
C) Ensure that this system is behind a NGFW.
upvoted 0 times
...
Paola
24 days ago
B) Configure client certificates for domain services.
upvoted 0 times
...
Tracey
1 months ago
A) Disable all protocols that do not use encryption.
upvoted 0 times
...
...
Amie
2 months ago
I think the analyst should recommend option A) Disable all protocols that do not use encryption.
upvoted 0 times
...

Save Cancel