Using a bastion host with multi-step login and session logging provides a controlled intermediary for remote access. This protective layer reduces direct exposure to external traffic, enforces stronger sign-in steps, and centralizes visibility. The other options expose the server to weaker authentication, rely on less restrictive configurations, or offer fewer monitoring capabilities.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a bastion host and why is it important?
Open an interactive chat with Bash
How does multi-step login enhance security?
Open an interactive chat with Bash
What types of logs are collected on bastion hosts, and how are they used?
Open an interactive chat with Bash
CompTIA Cloud+ CV0-004
Security
Your Score:
Report Issue
Bash, the Crucial Exams Chat Bot
AI Bot
Loading...
Loading...
Loading...
IT & Cybersecurity Package Join Premium for Full Access