Question

A security analyst is going through systems looking for potential misconfigurations.

What are some key items the analyst should search for while misconfiguration hunting? (Select three.)

answer

New user creation


Unpatched software


Money transfer


Open ports


Isolated networks


Physical access points


Weak passwords

Answers

GPT-4o mini
When hunting for potential misconfigurations, the security analyst should focus on the following key items:

1. **Unpatched software** - Outdated software can have vulnerabilities that can be exploited by attackers. It is essential to ensure that all software, including operating systems and applications, are kept up to date with the latest patches.

2. **Open ports** - Unnecessarily open ports can expose services to the internet that should not be accessible, potentially leading to unauthorized access. The analyst should review firewall configurations to ensure that only the necessary ports are open.

3. **Weak passwords** - Weak or easily guessed passwords can provide an easy entry point for attackers. Auditing password policies and practices is crucial to ensure that strong, complex passwords are enforced.

These areas are critical as they can lead to significant security risks if not properly managed.