Protecting Against Infection When Granting Remote Access to a Server | Best Practices

The Most Important Step to Protect Against Infection When Granting Remote Server Access

Question

A manager requests remote access to a server after hours and on weekends to check data.

The manager insists on using the server.

Before granting the access, which of the following is the MOST important step a technician can take to protect against possible infection?

Answers

Explanations

Click on the arrows to vote for the correct answer

A. B. C. D.

C.

When a manager requests remote access to a server after hours and on weekends to check data, it is important for the technician to take steps to protect against possible infection. The following options are given:

A. Create a policy to remove Internet access from the server during off hours B. Set the local antivirus software on the server to update and scan daily C. Ensure the server is patched with the latest security updates D. Educate the manager on safe Internet browsing practices.

Out of these options, the most important step a technician can take to protect against possible infection is to ensure that the server is patched with the latest security updates (Option C). This is because security updates are released to address known vulnerabilities in software, and not patching a server leaves it vulnerable to exploitation by attackers. Regular patching helps to ensure that the server is secure and less susceptible to attacks.

While setting up antivirus software on the server to update and scan daily (Option B) can provide an additional layer of protection, it may not be enough to prevent all types of attacks. Antivirus software can only detect and remove known malware and viruses, but it cannot protect against zero-day exploits or other advanced types of attacks.

Creating a policy to remove Internet access from the server during off hours (Option A) can help reduce the risk of infection, but it is not the most important step to take. Some remote access methods may require Internet access to function properly, and this option does not address the risk of attacks through other vectors such as email or removable media.

Educating the manager on safe Internet browsing practices (Option D) is always a good practice, but it is not the most important step to take in this scenario. Even with the best browsing practices, there is always a risk of infection from other sources such as email or other software vulnerabilities.

In conclusion, ensuring that the server is patched with the latest security updates is the most important step a technician can take to protect against possible infection when granting remote access to a server after hours and on weekends.