Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Cisco Exam 350-201 Topic 5 Question 83 Discussion

Actual exam question for Cisco's 350-201 exam
Question #: 83
Topic #: 5
[All 350-201 Questions]

Engineers are working to document, list, and discover all used applications within an organization. During the regular assessment of applications from the HR backup server, an engineer discovered an unknown application. The analysis showed that the application is communicating with external addresses on a non- secure, unencrypted channel. Information gathering revealed that the unknown application does not have an owner and is not being used by a business unit. What are the next two steps the engineers should take in this investigation? (Choose two.)

Show Suggested Answer Hide Answer
Suggested Answer: A, D

Contribute your Thoughts:

Troy
4 days ago
Engaging the incident response team is also a must. They'll have the expertise to properly investigate and handle this situation.
upvoted 0 times
...
Linette
5 days ago
My first thought is that we should definitely determine the type of data stored on the affected asset. That could be crucial in understanding the potential impact.
upvoted 0 times
...
Melissa
6 days ago
I agree, this is a serious security concern. We need to act quickly to identify the threat and mitigate the risk.
upvoted 0 times
...
Lashon
7 days ago
This is a tricky question. We need to figure out the best way to handle this unknown application that's communicating with external addresses without encryption.
upvoted 0 times
...

Save Cancel