An engineer is reviewing the security architecture for an enterprise network. During the review, the engineer notices an undocumented node on the network. Which of the following approaches can be utilized to determine how this node operates? (Choose two.)
A) Use reverse engineering and techniques
B) Assess the node within a continuous integration environment
C) Employ a static code analyzer
D) Review network and traffic logs
E) Use a penetration testing framework to analyze the node
F) Analyze the output of a ping sweep
Correct Answer:
Verified
Q321: Ann, a security administrator, is conducting an
Q322: An internal application has been developed to
Q323: As a result of an acquisition, a
Q324: Company leadership believes employees are experiencing an
Q325: A security analyst has been asked to
Q327: An organization wants to arm its cybersecurity
Q328: Following a recent and very large corporate
Q329: As part of an organization's compliance program,
Q330: A vendor develops a mobile application for
Q331: An organization's network security administrator has been
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents