A consultant completed testing with a short-term server hosted in an offsite environment. Which approach helps confirm that leftover systems cannot be accessed by unknown parties?
Remove the transient host and eliminate its disks from the provider
Turn off single sign-on features while leaving the instance operational
Retain the server but drop all unused inbound ports
Apply revised firewall rules and maintain the existing instance
When a temporary machine remains online, unseen configurations or default credentials may be exposed. Fully removing that machine from the hosting environment prevents malicious actors from leveraging any overlooked entry points. Restricting inbound traffic does not remove the asset from the environment, disabling single sign-on does not eliminate the presence of the server, and updating firewalls without removing the system leaves it potentially discoverable.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why is removing the transient host more secure than keeping it and dropping unused ports?
Open an interactive chat with Bash
What are default credentials, and why are they considered a risk?
Open an interactive chat with Bash
How can malicious actors discover systems left online in hosting environments?