Cyber Monday 2024! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Cisco Exam 350-201 Topic 10 Question 90 Discussion

Actual exam question for Cisco's 350-201 exam
Question #: 90
Topic #: 10
[All 350-201 Questions]

Engineers are working to document, list, and discover all used applications within an organization. During the regular assessment of applications from the HR backup server, an engineer discovered an unknown application. The analysis showed that the application is communicating with external addresses on a non- secure, unencrypted channel. Information gathering revealed that the unknown application does not have an owner and is not being used by a business unit. What are the next two steps the engineers should take in this investigation? (Choose two.)

Show Suggested Answer Hide Answer
Suggested Answer: A, D

Contribute your Thoughts:

Renato
5 months ago
Haha, I bet the person who installed this 'unknown' app is trying to sneak in some personal Netflix during work hours.
upvoted 0 times
Barrie
5 months ago
D) Initiate a triage meeting with department leads to determine if the application is owned internally or used by any business unit and document the asset owner.
upvoted 0 times
...
Gretchen
5 months ago
A) Determine the type of data stored on the affected asset, document the access logs, and engage the incident response team.
upvoted 0 times
...
...
Buck
5 months ago
I think they should identify who installed the application by reviewing the logs and gather a user access log from the HR department.
upvoted 0 times
...
Mitzie
5 months ago
Identifying the owner and investigating the user logs is crucial. We don't want any unauthorized access or usage of this application.
upvoted 0 times
Nobuko
4 months ago
D) Initiate a triage meeting with department leads to determine if the application is owned internally or used by any business unit and document the asset owner.
upvoted 0 times
...
Margart
5 months ago
A) Determine the type of data stored on the affected asset, document the access logs, and engage the incident response team.
upvoted 0 times
...
...
Nilsa
5 months ago
I believe they should verify user credentials on the affected asset and confirm available patches and updates are installed.
upvoted 0 times
...
Gianna
6 months ago
This seems like a serious issue. I would start with determining the type of data and reviewing the access logs to understand the potential impact.
upvoted 0 times
Pa
5 months ago
D) Initiate a triage meeting with department leads to determine if the application is owned internally or used by any business unit and document the asset owner.
upvoted 0 times
...
Floyd
5 months ago
A) Determine the type of data stored on the affected asset, document the access logs, and engage the incident response team.
upvoted 0 times
...
...
Jackie
6 months ago
I agree with Sherly. They should also initiate a triage meeting with department leads to document the asset owner.
upvoted 0 times
...
Sherly
6 months ago
I think the engineers should determine the type of data stored on the affected asset and engage the incident response team.
upvoted 0 times
...

Save Cancel
az-700  pass4success  az-104  200-301  200-201  cissp  350-401  350-201  350-501  350-601  350-801  350-901  az-720  az-305  pl-300  

Warning: Cannot modify header information - headers already sent by (output started at /pass.php:70) in /pass.php on line 77