Cyber Monday 2024! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

CompTIA Exam CS0-003 Topic 3 Question 35 Discussion

Actual exam question for CompTIA's CS0-003 exam
Question #: 35
Topic #: 3
[All CS0-003 Questions]

A security analyst runs the following command:

# nmap -T4 -F 192.168.30.30

Starting nmap 7.6

Host is up (0.13s latency)

PORT STATE SERVICE

23/tcp open telnet

443/tcp open https

636/tcp open ldaps

Which of the following should the analyst recommend first to harden the system?

Show Suggested Answer Hide Answer
Suggested Answer: A

Comprehensive Detailed

The nmap scan results show that Telnet (port 23) is open. Telnet transmits data, including credentials, in plaintext, which is insecure and should be disabled to enhance security. Here's an explanation of each option:

A . Disable all protocols that do not use encryption

Disabling unencrypted protocols (such as Telnet) reduces exposure to man-in-the-middle (MITM) attacks and credential sniffing. Telnet should be replaced with a secure protocol like SSH, which provides encryption for transmitted data.

B . Configure client certificates for domain services

While client certificates enhance authentication security, they are more relevant to services like LDAP over SSL (port 636), which is already secure. This would not address the Telnet vulnerability.

C . Ensure that this system is behind a NGFW

A Next-Generation Firewall (NGFW) provides enhanced network security, but it may not mitigate the risks of unencrypted protocols if they are allowed internally.

D . Deploy a publicly trusted root CA for secure websites

Public root CAs are used for website authentication and encryption, relevant only if this system is hosting a publicly accessible HTTPS service. It would not impact Telnet security.


CIS Controls: Recommendations on secure configurations, especially the use of encrypted protocols.

NIST SP 800-47: Security considerations for network protocols, emphasizing encrypted alternatives like SSH over Telnet.

Contribute your Thoughts:

Evangelina
22 hours ago
I think option C) Ensure that this system is behind a NGFW is also crucial for added protection.
upvoted 0 times
...
Major
4 days ago
I agree with Amie. It's important to prioritize security by disabling unencrypted protocols.
upvoted 0 times
...
Stephaine
7 days ago
Client certificates? That's some hardcore security stuff right there. I bet the analyst's fingers are gonna be cramping up just trying to configure that.
upvoted 0 times
...
Ethan
8 days ago
Nah, man, I'd go for the NGFW option. That'll give you a solid firewall to block all the bad stuff before it even gets to the system.
upvoted 0 times
...
Leila
18 days ago
Definitely, the first thing to do is disable all the unencrypted protocols like telnet. Gotta keep that data secure, yo!
upvoted 0 times
...
Amie
20 days ago
I think the analyst should recommend option A) Disable all protocols that do not use encryption.
upvoted 0 times
...

Save Cancel
az-700  pass4success  az-104  200-301  200-201  cissp  350-401  350-201  350-501  350-601  350-801  350-901  az-720  az-305  pl-300  

Warning: Cannot modify header information - headers already sent by (output started at /pass.php:70) in /pass.php on line 77