CompTIA CySA+ Practice Test 2025 – The Comprehensive All-in-One Guide to Exam Success!

Disable ads (and more) with a premium pass for a one time $4.99 payment

Question: 1 / 165

Which action should be taken to mitigate attacks while maintaining legitimate service access?

Reduce the overall server capacity

Utilize firewall rules to limit traffic based on host authenticity

Utilizing firewall rules to limit traffic based on host authenticity is an effective action to take because it enhances security without unnecessarily hindering legitimate access to services. By implementing these rules, the firewall can evaluate incoming traffic and permit only requests from trusted and authenticated sources while blocking potentially malicious ones. This ensures that legitimate users can access the necessary services seamlessly, while reducing the risk of unauthorized access and mitigating the chances of successful attacks.

In contrast, reducing overall server capacity could result in legitimate users experiencing poor service or even denial of service, as fewer resources would be available to handle their requests. Disabling remote management options might enhance security but also restrict necessary access for legitimate administrative tasks, compromising the ability to manage systems effectively. Encouraging users to log in at specific times may help distribute server load but does not fundamentally enhance security or mitigate attacks effectively. Overall, firewall rules focused on host authenticity provide a balanced approach to protection while allowing for continuous legitimate access.

Get further explanation with Examzify DeepDiveBeta

Disable remote management options

Encourage users to log in at specific times

Next

Report this question

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy