PrepAway - Latest Free Exam Questions & Answers

Which of the following is the BEST action for the admin…

A database administrator receives a call on an outside telephone line from a person who states that they work for a well-known database vendor. The caller states
there have been problems applying the newly released vulnerability patch for their database system, and asks what version is being used so that they can assist.
Which of the following is the BEST action for the administrator to take?

PrepAway - Latest Free Exam Questions & Answers

A.
Thank the caller, report the contact to the manager, and contact the vendor support line to verify any reported patch issues.

B.
Obtain the vendor’s email and phone number and call them back after identifying the number of systems affected by the patch.

C.
Give the caller the database version and patch level so that they can receive help applying the patch.

D.
Call the police to report the contact about the database systems, and then check system logs for attack attempts.

Explanation:
Impersonation is where a person, computer, software application or service pretends to be someone or something it’s not. Impersonation is commonly nonmaliciously used in client/server applications. However, it can also be used as a security threat.
In this question, the person making the call may be impersonating someone who works for a well-known database vendor. The actions described in this answer
would mitigate the risk. By not divulging information about your database system and contacting the vendor directly, you can be sure that you are talking to the right
people.
Incorrect Answers:
B: Identifying the number of systems affected by the patch would involve divulging the version number to the caller without being able to verify his identity.
Therefore, this answer is incorrect.
C: Giving the caller the database version and patch level so that they can receive help applying the patch would be divulging potentially sensitive information to
someone without being able to verify their identity. The version information could then be used for malicious purposes later especially if that version of software has
known vulnerabilities. Therefore, this answer is incorrect.
D: Calling the police to report the contact about the database systems, and then checking system logs for attack attempts may be overkill. You don’t know that the
caller is malicious. He may well be from the vendor company. You just need a way to verify his identity. Therefore, this answer is incorrect.


Leave a Reply