Which of the follow...
 
Notifications
Clear all

Which of the following MOST appropriate corrective action to document for this finding?

1 Posts
1 Users
0 Likes
164 Views
(@colmenerocarmelo)
Noble Member
Joined: 2 years ago
Posts: 746
Topic starter  

A Chief information Security Officer (CISO) is developing corrective-action plans based on the following from a vulnerability scan of internal hosts:

Which of the following MOST appropriate corrective action to document for this finding?

  • A . The product owner should perform a business impact assessment regarding the ability to implement a WA
  • C . The application developer should use a static code analysis tool to ensure any application code is not vulnerable to buffer overflows.
  • D . The system administrator should evaluate dependencies and perform upgrade as necessary.
  • E . The security operations center should develop a custom IDS rule to prevent attacks
    buffer overflows against this server.

Show Answer Hide Answer

Suggested Answer: A

   
Quote
Topic Tags

Latest CompTIA CAS-004 Dumps Valid Version

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund
Share: