ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 28 - CAS-004 discussion

Report
Export

A security analyst receives an alert from the SIEM regarding unusual activity on an authorized public SSH jump server. To further investigate, the analyst pulls the event logs directly from /var/log/auth.log: graphic.ssh_auth_log.

Which of the following actions would BEST address the potential risks by the activity in the logs?

A.
Alerting the misconfigured service account password
Answers
A.
Alerting the misconfigured service account password
B.
Modifying the AllowUsers configuration directive
Answers
B.
Modifying the AllowUsers configuration directive
C.
Restricting external port 22 access
Answers
C.
Restricting external port 22 access
D.
Implementing host-key preferences
Answers
D.
Implementing host-key preferences
Suggested answer: B

Explanation:

The AllowUsers configuration directive is an option for SSH servers that specifies which users are allowed to log in using SSH. The directive can include usernames, hostnames, IP addresses, or patterns. The directive can also be negated with a preceding exclamation mark (!) to deny access to specific users.

The logs show that there are multiple failed login attempts from different IP addresses using different usernames, such as root, admin, test, etc. This indicates a brute-force attack that is trying to guess the SSH credentials. To address this risk, the security analyst should modify the AllowUsers configuration directive to only allow specific users or hosts that are authorized to access the SSH jump server. This will prevent unauthorized users from attempting to log in using SSH and reduce the attack surface.

Reference: https://man.openbsd.org/sshd_config#AllowUsers https://www.ssh.com/academy/ssh/brute-force

asked 02/10/2024
Mahdi Far
32 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first