Engineers are working to document, list, and discover all used applications within an organization. During the regular assessment of applications from the HR backup server, an engineer discovered an unknown application. The analysis showed that the application is communicating with external addresses on a non- secure, unencrypted channel. Information gathering revealed that the unknown application does not have an owner and is not being used by a business unit. What are the next two steps the engineers should take in this investigation? (Choose two.)
Ora
21 days agoAndree
22 days agoWhitley
1 months agoKeva
2 months agoIzetta
27 days agoCorinne
28 days agoSon
1 months agoTammara
1 months agoDong
2 months agoUna
2 months agoLauran
2 months agoHester
1 months agoAntonio
1 months agoGeoffrey
1 months agoEliseo
2 months agoMaryann
1 months agoAnastacia
2 months ago