Web Server Hardening Checklist

What actions should a system administrator take when deploying a new server based on the given data?

A. Secure a guest zone

B. Use SSH for uploading files

C. Use the configuration templates provided

Answer:

The actions that a system administrator should take when deploying a new server based on the given data are:

A. Secure a guest zone

B. Use SSH for uploading files

C. Use the configuration templates provided

Web server hardening is essential for ensuring the security of the server and its data. When deploying a new server, system administrators should follow a checklist to strengthen the server's security posture.

1. Secure a Guest Zone:

Creating a separate guest zone helps isolate potentially untrusted users or devices from the main network. This reduces the risk of unauthorized access to critical data.

2. Use SSH for Uploading Files:

Secure Shell (SSH) is a secure protocol for securely transferring files to and from the server. It encrypts the data during transmission, providing a secure method for file uploads.

3. Use Configuration Templates:

Utilizing the provided configuration templates ensures that the server is configured according to best practices for security. These templates help streamline the deployment process and ensure consistency in server settings.

By following these actions, system administrators can enhance the security of newly deployed servers and minimize the risk of cyber attacks and data breaches.

← Preventative measures for tailgating social engineering Deleting cells in a worksheet →