Your company is deploying a new set of servers acquired from a hardware provider. What is the BEST initial step to ensure these devices do not introduce vulnerabilities into the company's network?
Enable full disk encryption on all servers as part of the initial configuration.
Review and verify the server firmware to ensure it's up-to-date and from a legitimate source.
Perform a comprehensive vulnerability scan on all servers immediately after they're connected to the network.
Conduct penetration testing on the servers to identify and exploit potential security weaknesses.
Reviewing and verifying the security posture of the server firmware is the most effective step to ensure the new devices comply with security best practices before they are integrated into the company's network. Firmware can often be a target for supply chain attacks and may contain vulnerabilities that need to be addressed. While conducting penetration testing is valuable, it is not the first step in ensuring the security of new hardware. Similarly, vulnerability scanning is important but would follow the initial step of reviewing the firmware. Enabling full disk encryption is a good security practice for data protection but would not necessarily address potential supply chain vulnerabilities present in firmware or hardware configuration.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why is verifying server firmware the best initial step for security?
Open an interactive chat with Bash
What are supply chain attacks, and how do they relate to server firmware?
Open an interactive chat with Bash
What tools or methods are commonly used to verify server firmware?