Prepare for the CompTIA CySA+ Exam with comprehensive tests and detailed explanations. Enhance your knowledge with multiple question formats and expert insights. Ace your exam with confidence!

Each practice test/flash card set has 50 randomly selected questions from a bank of over 500. You'll get a new set of questions each time!

Practice this question and more.


Which action should be taken to mitigate attacks while maintaining legitimate service access?

  1. Reduce the overall server capacity

  2. Utilize firewall rules to limit traffic based on host authenticity

  3. Disable remote management options

  4. Encourage users to log in at specific times

The correct answer is: Utilize firewall rules to limit traffic based on host authenticity

Utilizing firewall rules to limit traffic based on host authenticity is an effective action to take because it enhances security without unnecessarily hindering legitimate access to services. By implementing these rules, the firewall can evaluate incoming traffic and permit only requests from trusted and authenticated sources while blocking potentially malicious ones. This ensures that legitimate users can access the necessary services seamlessly, while reducing the risk of unauthorized access and mitigating the chances of successful attacks. In contrast, reducing overall server capacity could result in legitimate users experiencing poor service or even denial of service, as fewer resources would be available to handle their requests. Disabling remote management options might enhance security but also restrict necessary access for legitimate administrative tasks, compromising the ability to manage systems effectively. Encouraging users to log in at specific times may help distribute server load but does not fundamentally enhance security or mitigate attacks effectively. Overall, firewall rules focused on host authenticity provide a balanced approach to protection while allowing for continuous legitimate access.