ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 445 - CAS-004 discussion

Report
Export

The security analyst discovers a new device on the company's dedicated loT subnet during the most recent vulnerability scan. The scan results show numerous open ports and insecure protocols in addition to default usernames and passwords. A camera needs to transmit video to the security server in the loT subnet. Which of the following should the security analyst recommend to securely operate the camera?

A.
Harden the camera configuration.
Answers
A.
Harden the camera configuration.
B.
Send camera logs to the SIEM.
Answers
B.
Send camera logs to the SIEM.
C.
Encrypt the camera's video stream.
Answers
C.
Encrypt the camera's video stream.
D.
Place the camera on an isolated segment
Answers
D.
Place the camera on an isolated segment
Suggested answer: A

Explanation:

To securely operate the camera, the security analyst should recommend hardening the camera configuration. This involves several steps:

Changing Default Credentials: Default usernames and passwords are a common vulnerability. They should be replaced with strong, unique passwords.

Disabling Unnecessary Services and Ports: The numerous open ports and insecure protocols should be reviewed, and any unnecessary services should be disabled to reduce the attack surface.

Firmware Updates: Ensuring the camera's firmware is up to date will mitigate known vulnerabilities.

Enable Encryption: If possible, enable encryption for both data in transit and at rest to protect the video stream and other communications from interception.

This approach addresses the identified vulnerabilities directly and ensures that the device is more secure. Simply sending logs to the SIEM or isolating the camera might not fully mitigate the risks associated with default settings and open ports.

CompTIA CASP+ CAS-004 Exam Objectives: Section 2.4: Implement security activities across the technology life cycle.

CompTIA CASP+ Study Guide, Chapter 5: Implementing Host Security.

asked 02/10/2024
max artusa
39 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first