Exam CAS-004 All QuestionsBrowse all questions from this exam
Question 422

A security administrator needs to implement a security solution that will:

• Limit the attack surface in case of an incident.

• Improve access control for external and internal network security.

• Improve performance with less congestion on network traffic.

Which of the following should the security administrator do?

    Correct Answer: B

    To meet the requirements of limiting the attack surface, improving access control for both internal and external networks, and reducing network traffic congestion for better performance, the security administrator should update firewall rules to match new IP addresses in use. Updating firewall rules ensures that only authorized traffic is allowed, thereby minimizing the attack surface. It strengthens access control and improves overall network efficiency by blocking unnecessary traffic and reducing congestion.

Discussion
saucehozzOption: B

B. The only answer hits all requirements

cf13076Option: B

B. Update firewall rules to match new IP addresses in use. By updating firewall rules to match the new IP addresses in use, the security administrator can limit the attack surface and improve access control for external and internal network security. This will also help improve performance by reducing congestion on network traffic.

isaphiltrickOption: B

Updating firewall rules to ensure they match the new IP addresses in use is crucial for maintaining effective access control. This action helps to limit the attack surface by ensuring that only authorized traffic is allowed through the firewall. Properly configured firewall rules can improve internal and external network security and reduce congestion by blocking unwanted or malicious traffic, thereby improving overall network performance.

041ba31Option: B

The best answer is B. Update firewall rules to match new IP addresses in use. Updating firewall rules to match new IP addresses helps to limit the attack surface by only allowing traffic from known, trusted IPs. It also improves access control for both external and internal network security and can enhance performance by reducing unnecessary or unauthorized network traffic.