List of questions
Related questions
Question 178 - CS0-003 discussion
During an internal code review, software called 'ACE' was discovered to have a vulnerability that allows the execution of arbitrary code. The vulnerability is in a legacy, third-party vendor resource that is used by the ACE software. ACE is used worldwide and is essential for many businesses in this industry. Developers informed the Chief Information Security Officer that removal of the vulnerability will take time. Which of the following is the first action to take?
A.
Look for potential loCs in the company.
B.
Inform customers of the vulnerability.
C.
Remove the affected vendor resource from the ACE software.
D.
Develop a compensating control until the issue can be fixed permanently.
Your answer:
0 comments
Sorted by
Leave a comment first