A consultant completed testing with a short-term server hosted in an offsite environment. Which approach helps confirm that leftover systems cannot be accessed by unknown parties?
Apply revised firewall rules and maintain the existing instance
Retain the server but drop all unused inbound ports
Turn off single sign-on features while leaving the instance operational
Remove the transient host and eliminate its disks from the provider
When a temporary machine remains online, unseen configurations or default credentials may be exposed. Fully removing that machine from the hosting environment prevents malicious actors from leveraging any overlooked entry points. Restricting inbound traffic does not remove the asset from the environment, disabling single sign-on does not eliminate the presence of the server, and updating firewalls without removing the system leaves it potentially discoverable.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What does it mean to remove a transient host and its disks?
Open an interactive chat with Bash
Why is restricting inbound traffic or updating firewalls insufficient?
Open an interactive chat with Bash
What risks are associated with leaving a temporary server running?