Cyber Monday 2024! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Cisco Exam 350-201 Topic 5 Question 83 Discussion

Actual exam question for Cisco's 350-201 exam
Question #: 83
Topic #: 5
[All 350-201 Questions]

Engineers are working to document, list, and discover all used applications within an organization. During the regular assessment of applications from the HR backup server, an engineer discovered an unknown application. The analysis showed that the application is communicating with external addresses on a non- secure, unencrypted channel. Information gathering revealed that the unknown application does not have an owner and is not being used by a business unit. What are the next two steps the engineers should take in this investigation? (Choose two.)

Show Suggested Answer Hide Answer
Suggested Answer: A, D

Contribute your Thoughts:

Lawrence
6 months ago
I think verifying user credentials on the affected asset and confirming available patches are important steps too.
upvoted 0 times
...
Lavina
6 months ago
I believe we should also initiate a triage meeting with department leads to determine the asset owner.
upvoted 0 times
...
Louisa
6 months ago
I agree with Nan. We need to act fast and document the access logs as well.
upvoted 0 times
...
Nan
6 months ago
I think the next step should be to determine the type of data stored on the affected asset and engage the incident response team.
upvoted 0 times
...
Omega
7 months ago
That's a good point, Justine. By doing that, they can verify user credentials on the affected asset and confirm available patches and updates are installed.
upvoted 0 times
...
Justine
7 months ago
But shouldn't they first identify who installed the application? I think they should gather a user access log from the HR department.
upvoted 0 times
...
Justine
7 months ago
I agree with Omega. They should also initiate a triage meeting with department leads to document the asset owner.
upvoted 0 times
...
Omega
7 months ago
I think the engineers should determine the type of data stored on the affected asset and engage the incident response team.
upvoted 0 times
...
Troy
8 months ago
Engaging the incident response team is also a must. They'll have the expertise to properly investigate and handle this situation.
upvoted 0 times
...
Linette
8 months ago
My first thought is that we should definitely determine the type of data stored on the affected asset. That could be crucial in understanding the potential impact.
upvoted 0 times
Cordelia
8 months ago
C) Verify user credentials on the affected asset, modify passwords, and confirm available patches and updates are installed.
upvoted 0 times
...
Dortha
8 months ago
A) Determine the type of data stored on the affected asset, document the access logs, and engage the incident response team.
upvoted 0 times
...
...
Melissa
8 months ago
I agree, this is a serious security concern. We need to act quickly to identify the threat and mitigate the risk.
upvoted 0 times
...
Lashon
8 months ago
This is a tricky question. We need to figure out the best way to handle this unknown application that's communicating with external addresses without encryption.
upvoted 0 times
...

Save Cancel
az-700  pass4success  az-104  200-301  200-201  cissp  350-401  350-201  350-501  350-601  350-801  350-901  az-720  az-305  pl-300  

Warning: Cannot modify header information - headers already sent by (output started at /pass.php:70) in /pass.php on line 77