An attacker exploited an unpatched vulnerability in a web framework, and then used an application service account that had an insecure configuration to download a rootkit. The attacker was unable to obtain root privileges. Instead, the attacker downloaded a cryptocurrency mining program and subsequently was discovered. The server was taken offline, rebuilt, and patched. Which of the following to the security Engineers to help prevent a similar scenario in the future.
Remove root privileges from the application service account
Implement separation of duties
properly configure SELinux set it to enforce
use cron to schedule regular restarts of the system to terminate sessions
perform regular uncredentialed vulnerability scans
Q:- An attacker exploited an unpatched vulnerability in a web framework, and then used an application service account that had an insecure configuration to download a rootkit. The attacker was unable to obtain root privileges. Instead, the attacker downloaded a cryptocurrency mining program and subsequently was discovered. The server was taken offline, rebuilt, and patched. Which of the following to the security Engineers to help prevent a similar scenario in the future.
Remove root privileges from the application service account
Implement separation of duties
properly configure SELinux set it to enforce
use cron to schedule regular restarts of the system to terminate sessions
perform regular uncredentialed vulnerability scans
Answer:------
Remove root privileges from the application service account
Get Answers For Free
Most questions answered within 1 hours.