Your company is deploying a new set of servers acquired from a hardware provider. What is the BEST initial step to ensure these devices do not introduce vulnerabilities into the company's network?
Enable full disk encryption on all servers as part of the initial configuration.
Perform a comprehensive vulnerability scan on all servers immediately after they're connected to the network.
Review and verify the server firmware to ensure it's up-to-date and from a legitimate source.
Conduct penetration testing on the servers to identify and exploit potential security weaknesses.
Reviewing and verifying the security posture of the server firmware is the most effective step to ensure the new devices comply with security best practices before they are integrated into the company's network. Firmware can often be a target for supply chain attacks and may contain vulnerabilities that need to be addressed. While conducting penetration testing is valuable, it is not the first step in ensuring the security of new hardware. Similarly, vulnerability scanning is important but would follow the initial step of reviewing the firmware. Enabling full disk encryption is a good security practice for data protection but would not necessarily address potential supply chain vulnerabilities present in firmware or hardware configuration.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is firmware and why is it important to verify it?
Open an interactive chat with Bash
What are supply chain attacks and how can they affect my servers?
Open an interactive chat with Bash
Why is vulnerability scanning not the first step in server deployment?