A security analyst scans a company's public network and discovers a host is running a remote desktop that can be used to access the production network. Which of the following changes should the security analyst recommend?
This seems like a straightforward security question. I'd recommend setting up a VPN and placing the jump server inside the firewall to better secure the connection.
I think the key here is understanding what privileges are required for a secure view to reference data across multiple databases. The options mention CREATE_SHARE, SHARE, SELECT, and REFERENCE_USAGE, so I'll need to carefully consider which one is the most appropriate.
Guys, I hate to be that person, but have you considered option D? Connecting the remote server to the domain and increasing the password length could be a simple yet effective way to tighten security. Just a thought.
Ah, I see where you're coming from, but I think option C is the way to go. Using a proxy for the web connections from the remote desktop server could help monitor and control the traffic, without the overhead of a full VPN setup.
Hmm, I see what you mean, but I'm not sure a VPN is the best solution here. Changing the port to a non-standard number (option A) could be a quick fix and make it harder for attackers to find the remote desktop.
This is a tricky one. The remote desktop access is a major security risk, so we need to take decisive action. I'm leaning towards option B - setting up a VPN and placing the jump server inside the firewall. That way, we can control and monitor the connection more effectively.
upvoted 0 times
...
Log in to Pass4Success
Sign in:
Report Comment
Is the comment made by USERNAME spam or abusive?
Commenting
In order to participate in the comments you need to be logged-in.
You can sign-up or
login
Elke
5 days agoSteffanie
16 days agoTyra
17 days agoTawanna
2 years agoLeonie
2 years agoClemencia
2 years agoDelila
1 years agoIdella
1 years agoAgustin
1 years agoDanilo
1 years agoBuddy
1 years agoJohana
1 years agoTracey
1 years agoKarl
2 years ago