During a recent test, the team discovered that a high-value application server processes login requests over plain text. Which recommendation is most appropriate for the final documentation?
Implement a security solution that monitors for suspicious traffic
Block ping requests on the perimeter network device
Apply role-based access to the front-end web interface
Enforce an encrypted channel for user authentication
Enforcing a secure tunnel (such as Transport Layer Security (TLS) or Secure Shell (SSH)) addresses the root of this problem by preventing unauthorized observers from capturing plaintext credentials. Adding network monitoring software or a perimeter device does not correct the lack of encrypted authentication. Restricting user privileges is beneficial but does not fix the plain text transmission.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is Transport Layer Security (TLS) and why is it important?
Open an interactive chat with Bash
How does encrypting user authentication protect against attacks?
Open an interactive chat with Bash
Why are monitoring solutions insufficient to address plaintext credentials?