Engineers are working to document, list, and discover all used applications within an organization. During the regular assessment of applications from the HR backup server, an engineer discovered an unknown application. The analysis showed that the application is communicating with external addresses on a non-secure, unencrypted channel. Information gathering revealed that the unknown application does not have an owner and is not being used by a business unit. What are the next two steps the engineers should take in this investigation? (Choose two.)
A) Determine the type of data stored on the affected asset, document the access logs, and engage the incident response team.
B) Identify who installed the application by reviewing the logs and gather a user access log from the HR department.
C) Verify user credentials on the affected asset, modify passwords, and confirm available patches and updates are installed.
D) Initiate a triage meeting with department leads to determine if the application is owned internally or used by any business unit and document the asset owner.
Correct Answer:
Verified
Q71: An engineer notices that every Sunday night,
Q72: A SOC team receives multiple alerts by
Q73: An analyst received multiple alerts on the
Q74: Which action should be taken when the
Q75: A cloud engineer needs a solution to
Q77: An engineer received multiple reports from users
Q78: A security engineer discovers that a spreadsheet
Q79: An engineer detects an intrusion event inside
Q80: What is the difference between process orchestration
Q81:
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents