A security audit uncovers multiple user sessions coming from unexpected locations. The team suspects an account is being used by external parties. Which tactic disrupts the misuse and secures access?
Expand network segmentation settings to isolate only suspect traffic from unknown IP addresses
Revoke tokens issued to the account, assign updated secrets, and prompt affected users to confirm identity
Install new patches on hosts and prioritize container orchestration updates for vulnerability scanning
Add system logs to a central server for review while retaining existing tokens for full investigation
Revoking tokens and enforcing new keys ensures unauthorized sessions lose access while users receive updated methods for authentication. Other methods do not invalidate compromised access or require new verification, leaving the environment susceptible to ongoing misuse.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are tokens and how are they used for authentication?
Open an interactive chat with Bash
What does it mean to ‘assign updated secrets’ in a security context?
Open an interactive chat with Bash
Why is confirming user identity important after revoking tokens?
Open an interactive chat with Bash
CompTIA Cloud+ CV0-004
Troubleshooting
Your Score:
Report Issue
Bash, the Crucial Exams Chat Bot
AI Bot
Loading...
Loading...
Loading...
IT & Cybersecurity Package Join Premium for Full Access