Application logs show abnormal resource usage in a microservice that references an outdated library. Additional investigation reveals that the library contains a known security flaw. Which action is the best next step to reduce infiltration risk?
Remove or update the outdated component and verify that functionality is maintained
Collect usage statistics before taking further action
Deactivate automated scanning and rely on a vendor to provide a patch
Modify credentials to restrict access to the vulnerable microservice
Removing or updating the affected library helps ensure that the known flaw is addressed. Monitoring usage or changing credentials might be useful but does not fix the weakness itself. Deactivating regular scanning leaves hidden issues undetected and does not mitigate the exploit. Updating the library or removing it if it is not required helps secure the environment and maintain functionality.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a microservice, and why is it used?
Open an interactive chat with Bash
Why is keeping libraries updated important in microservices?
Open an interactive chat with Bash
How do you verify functionality after updating or removing a library?
Open an interactive chat with Bash
CompTIA Cloud+ CV0-004
Troubleshooting
Your Score:
Report Issue
Bash, the Crucial Exams Chat Bot
AI Bot
Loading...
Loading...
Loading...
IT & Cybersecurity Package Join Premium for Full Access