Which of the follow...
 
Notifications
Clear all

Which of the following MOST appropriate corrective action to document for this finding?

1 Posts
1 Users
0 Likes
172 Views
(@whellerrashad)
Posts: 729
Noble Member
Topic starter
 

A Chief information Security Officer (CISO) is developing corrective-action plans based on the following from a vulnerability scan of internal hosts:

Which of the following MOST appropriate corrective action to document for this finding?

  • A . The product owner should perform a business impact assessment regarding the ability to implement a WAF.
    B. The application developer should use a static code analysis tool to ensure any application code is not vulnerable to buffer overflows.
    C. The system administrator should evaluate dependencies and perform upgrade as necessary.
    D. The security operations center should develop a custom IDS rule to prevent attacks buffer overflows against this server.

Show Answer Hide Answer

Suggested Answer: A
 
Posted : 25/11/2022 12:17 pm
Topic Tags

Latest CAS-004 V1 Dumps Valid Version

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund
Share: