A network administrator receives reports that users are unable to access the company’s internal file server. The administrator verifies that the server is operational and the network infrastructure is functional. What is the BEST mitigation technique to ensure the users regain access?
Enhance real-time monitoring of network traffic to the file server.
Review and adjust the access control list (ACL) for the file server.
Decommission the current file server and migrate to a new one.
Patch the file server’s operating system and applications to the latest versions.
Reviewing and adjusting the access control list (ACL) is the most appropriate step when users are denied access to network resources, assuming there is no outage or malfunction of the actual resource or network. An ACL may have been incorrectly configured or updated, causing access issues. Examining and rectifying the ACL can restore proper access to authorized users. Patching, while important for security, would not directly address the immediate issue of access if the server and network are confirmed to be operational. Likewise, monitoring does not resolve current access issues, although it may help identify them. Finally, decommissioning the server would be counterintuitive if there's a need for its services.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is an Access Control List (ACL)?
Open an interactive chat with Bash
What types of issues can occur due to misconfigured ACLs?
Open an interactive chat with Bash
How can I ensure proper ACL configuration on resources?