A consultant completed testing with a short-term server hosted in an offsite environment. Which approach helps confirm that leftover systems cannot be accessed by unknown parties?
Turn off single sign-on features while leaving the instance operational
Retain the server but drop all unused inbound ports
Remove the transient host and eliminate its disks from the provider
Apply revised firewall rules and maintain the existing instance
When a temporary machine remains online, unseen configurations or default credentials may be exposed. Fully removing that machine from the hosting environment prevents malicious actors from leveraging any overlooked entry points. Restricting inbound traffic does not remove the asset from the environment, disabling single sign-on does not eliminate the presence of the server, and updating firewalls without removing the system leaves it potentially discoverable.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What does it mean to remove a transient host and its disks?
Open an interactive chat with Bash
Why is restricting inbound traffic or updating firewalls insufficient?
Open an interactive chat with Bash
What risks are associated with leaving a temporary server running?