A new scanning application is discovered running across multiple instances, and it is not listed in the organization’s approved application inventory. Which action is BEST?
Perform a traffic analysis on the scanning application and take no other steps
Integrate the scanning application into the current maintenance schedule
Restrict the scanning application’s network privileges and allow limited operation
Remove the scanning application, notify the compliance officer, and investigate its origin
Removing the unvetted application ensures that potential threats are promptly addressed and regulatory requirements are followed. Investigating its origin helps determine whether it poses a risk or if it was installed by mistake. Merely analyzing traffic or restricting activity does not remediate the possibility of malicious behavior. Implementing a maintenance schedule for unknown software does not address its unapproved status.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is an application inventory?
Open an interactive chat with Bash
Why is it important to remove unapproved applications?
Open an interactive chat with Bash
What steps are involved in investigating the origin of an application?
Open an interactive chat with Bash
CompTIA Cloud+ CV0-004
Troubleshooting
Your Score:
Report Issue
Bash, the Crucial Exams Chat Bot
AI Bot
Loading...
Loading...
Loading...
IT & Cybersecurity Package Join Premium for Full Access