The local administrator account for a company's VPN appliance was unexpectedly used to log in to the remote management interface. Which of the following would have most likely prevented this from happening?
None really, the answer here is likely B, but in this scenario C is the only thing that makes sense as preventive action:
A: irrelevant, admin should have access
B: This presumes the admin is left with a default password which isnt stated.. the question worded doesn't say anything about misconfiguration, it can't just expect you to assume thats the case
C: only preventive action, maybe if localadmin was USER10 , it can prevent the account from being a target.
D. not preventive action
If answer is B, it should be a different scenario or at least worded differently. nothing to say there was no configuration
I’m sorry but B is possible, but it isn’t the obvious answer. There is no indication that the system’s default password was used or any nefarious activity occurred. Sometimes system administrators use their privileged accounts when their normal accounts will accomplish a specific task: in that case, A would be a better answer.
B. Changing the default password
Explanation:
Default administrator accounts often come with weak or widely known credentials, making them an easy target for attackers. Changing the default password to a strong, unique one is a fundamental security practice that would have likely prevented unauthorized access.
Other Options:
A. Using least privilege: This is important but doesn't address the issue if the default password is still in use.
C. Assigning individual user IDs: While useful for tracking and accountability, it doesn't prevent unauthorized access if the default admin account remains active.
D. Reviewing logs more frequently: Log reviews can help detect incidents but won't prevent them.
Changing the default password directly addresses the vulnerability.
Keyword "unexpectedly" and "logged in". if expected it would be with privilege. But not known Somebody could have cracked an easy password.
My choice is B
C: By assigning individual user IDs, the company can track who is accessing the remote management interface and hold individuals accountable for their actions. This helps prevent unauthorized access and makes it easier to identify potential security threats.
The most likely action that would have prevented the local administrator account from being used unexpectedly to log in to the remote management interface is:
B. Changing the default password
Here’s why:
- Changing the default password: Many VPN appliances come with default usernames and passwords. If these are not changed, anyone with knowledge of the default credentials (which are often easily found online) can gain access to the appliance. Changing the default password to something strong and unique would make it much more difficult for unauthorized users to log in.
- A. Using least privilege: While this is a good security practice, it typically refers to ensuring users have only the minimum level of access needed to perform their tasks. In the case of an administrator account being used, the issue is more likely related to the strength of the password rather than inappropriate access rights being assigned.
Nowadays, there are not much systems that allow you to log in with a default password. In 2024, the answer should be either A or C. The best option is to disable local admin accounts and assign individual users with least privilege. So C & A is correct
Answer is B.
It's the *local* admin account. A and C wouldn't work here because those are talking specifically about non-local accounts.
To put it another way, go check your home router - if it's old enough, there's like a 99% chance the default username/password is just admin/admin. It's hard-coded so if you ever physically reset the device then the creds will always default back.
I will select C since its local administrator with default permission and should not be used remotely and best practice to assign individual user for each IT admin should manage this device
This is why I hate Sec+ questions. It should be assumed that part of assigning individual user accounts would be to disable a shared local admin account. Using shared accounts is bad practice!!
Many devices and applications come with default administrator credentials that are intended to be changed immediately after installation. Failure to change these passwords leaves systems vulnerable to unauthorized access. By changing the default password for the local administrator account, the company would significantly reduce the risk of unauthorized access. Attackers often attempt to use default credentials to gain entry, so ensuring these are changed is a fundamental security practice.
This section is not available anymore. Please use the main Exam Page.SY0-701 Exam Questions
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
d4a5620
Highly Voted 7 months, 2 weeks agofamuza77
6 months agoShaman73
Highly Voted 10 months, 2 weeks agoLinas312
Most Recent 1 week, 5 days agoMarysSon
4 weeks, 1 day agoAnyio
2 months, 3 weeks agochavers93
4 months, 2 weeks agoProudFather
4 months, 2 weeks agofmeox567
4 months, 4 weeks ago9ef4a35
5 months agoKelvinYau
5 months, 2 weeks agofamuza77
6 months agoTy13
6 months, 3 weeks agoFhaddad81
7 months agochasingsummer
7 months ago420JhonnySins69
7 months, 1 week agointernslayer
8 months, 1 week agodbrowndiver
8 months, 2 weeks ago