Cyber Monday 2024! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Cisco Exam 350-201 Topic 3 Question 85 Discussion

Actual exam question for Cisco's 350-201 exam
Question #: 85
Topic #: 3
[All 350-201 Questions]

Engineers are working to document, list, and discover all used applications within an organization. During the regular assessment of applications from the HR backup server, an engineer discovered an unknown application. The analysis showed that the application is communicating with external addresses on a non- secure, unencrypted channel. Information gathering revealed that the unknown application does not have an owner and is not being used by a business unit. What are the next two steps the engineers should take in this investigation? (Choose two.)

Show Suggested Answer Hide Answer
Suggested Answer: A, D

Contribute your Thoughts:

Annita
6 months ago
I think they should verify user credentials on the affected asset and modify passwords to ensure security.
upvoted 0 times
...
Lauran
6 months ago
That sounds like a good idea, It's crucial to document the asset owner for accountability.
upvoted 0 times
...
Alesia
6 months ago
I believe they should also initiate a triage meeting with department leads to determine if the application is owned internally or used by any business unit.
upvoted 0 times
...
Nan
7 months ago
I agree with It's important to document the access logs as well in case of any security breach.
upvoted 0 times
...
Lauran
7 months ago
I think the engineers should determine the type of data stored on the affected asset and engage the incident response team.
upvoted 0 times
...
Tamar
8 months ago
After that, let's identify who installed the application by reviewing the logs.
upvoted 0 times
...
Lorriane
8 months ago
I suggest we initiate a triage meeting with department leads to determine if the application is owned internally.
upvoted 0 times
...
Tamar
8 months ago
Let's determine the type of data stored on the affected asset and engage the incident response team.
upvoted 0 times
Lenna
8 months ago
D) Initiate a triage meeting with department leads to determine if the application is owned internally or used by any business unit and document the asset owner.
upvoted 0 times
...
Luisa
8 months ago
A) Determine the type of data stored on the affected asset, document the access logs, and engage the incident response team.
upvoted 0 times
...
...

Save Cancel
az-700  pass4success  az-104  200-301  200-201  cissp  350-401  350-201  350-501  350-601  350-801  350-901  az-720  az-305  pl-300  

Warning: Cannot modify header information - headers already sent by (output started at /pass.php:70) in /pass.php on line 77