Which of the following should the system administrator do?

A cybersecurity consultant is reviewing the following output from a vulnerability scan against a newly installed MS SQL Server 2012 that is slated to go into production in one week:

Based on the above information, which of the following should the system administrator do? (Select TWO).
A. Verify the vulnerability using penetration testing tools or proof-of-concept exploits.
B. Review the references to determine if the vulnerability can be remotely exploited.
C. Mark the result as a false positive so it will show in subsequent scans.
D. Configure a network-based ACL at the perimeter firewall to protect the MS SQL port.
E. Implement the proposed solution by installing Microsoft patch Q316333.

CS0-002: CompTIA CySA+ Exam

FULL Printable PDF and Software. VALID exam to help you PASS.

comptia-exams

2 thoughts on “Which of the following should the system administrator do?

    1. Hello dead cow cult:

      The SQL server should not be accessible directly through the perimeter firewall. If you want access from outside you should consider other solutions like: VPN, JumpBox or other services to drop inside the DMZ. Actually D should never be an option, because the SQL should not be accessible through the perimeter.

      In regards to your B answer: the fact that you used a Vulnerability tool and have a report, you already have an external reference that the vulnerability can be indeed exploited. If you would like to prove a point, then go with A. But in this particular case, according to CompTIA logic, the right way to go is D and E.

Leave a Reply

Your email address will not be published. Required fields are marked *


The reCAPTCHA verification period has expired. Please reload the page.