A security consultant notices new methods were introduced to secretly redirect traffic. Which measure brings the environment back to its stable condition while letting business processes continue?
Modify the extra items so they remain invisible to administrators
Use the original baseline in place of the extras and verify normal behavior
Remove lines pointing to the hidden components
Update system records to show typical connectivity
Replacing the newly introduced elements with the original baseline ensures that all hidden routes and configurations are removed. Simply removing references in logs, deleting partial code snippets, or hiding functionality within administrative tools fails to address the core changes or ensure the environment is restored to a known good state.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a baseline in cybersecurity?
Open an interactive chat with Bash
Why is using the original baseline important after discovering hidden routes or modifications?
Open an interactive chat with Bash
What methods can be used to verify normal behavior after restoring the original baseline?