Q: 11
Engineers are working to document, list, and discover all used applications within an organization.
During the regular assessment of applications from the HR backup server, an engineer discovered an
unknown application. The analysis showed that the application is communicating with external
addresses on a non- secure, unencrypted channel. Information gathering revealed that the unknown
application does not have an owner and is not being used by a business unit. What are the next two
steps the engineers should take in this investigation? (Choose two.)
Options
Discussion
Probably B and C. Figuring out who installed the app and locking down creds/patches seems like the first move here.
Be respectful. No spam.