ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 289 - PT0-002 discussion

Report
Export

A penetration tester gains access to a web server and notices a large number of devices in the system ARP table. Upon scanning the web server, the tester determines that many of the devices are user ...ch of the following should be included in the recommendations for remediation?

A.
training program on proper access to the web server
Answers
A.
training program on proper access to the web server
B.
patch-management program for the web server.
Answers
B.
patch-management program for the web server.
C.
the web server in a screened subnet
Answers
C.
the web server in a screened subnet
D.
Implement endpoint protection on the workstations
Answers
D.
Implement endpoint protection on the workstations
Suggested answer: D

Explanation:

The penetration tester should recommend implementing endpoint protection on the workstations, which is a security measure that involves installing software or hardware on devices that connect to a network to protect them from threats such as malware, ransomware, phishing, or unauthorized access. Endpoint protection can include antivirus software, firewalls, encryption tools, VPNs, or device management systems. Endpoint protection can help prevent user workstations from being compromised by attackers who have gained access to the web server or other devices on the network. The other options are not valid recommendations for remediation based on the discovery that many of the devices are user workstations. Changing passwords that were created before this code update is not relevant to this issue, as it refers to a different scenario involving password hashing and salting. Keeping hashes created by both methods for compatibility is not relevant to this issue, as it refers to a different scenario involving password hashing and salting. Moving the web server in a screened subnet is not relevant to this issue, as it refers to a different scenario involving network segmentation and isolation.

asked 02/10/2024
Carlos Fonseca
30 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first