ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 407 - SY0-601 discussion

Report
Export

A research company discovered that an unauthorized piece of software has been detected on a small number of machines in its lab The researchers collaborate with other machines using port 445 and on the internet using port 443 The unau-thorized software is starting to be seen on additional machines outside of the lab and is making outbound communications using HTTPS and SMS. The security team has been instructed to resolve the issue as quickly as possible while causing minimal disruption to the researchers. Which of the following is the best course Of action in this scenario?

A.
Update the host firewalls to block outbound Stv1B.
Answers
A.
Update the host firewalls to block outbound Stv1B.
B.
Place the machines with the unapproved software in containment
Answers
B.
Place the machines with the unapproved software in containment
C.
Place the unauthorized application in a Bocklist.
Answers
C.
Place the unauthorized application in a Bocklist.
D.
Implement a content filter to block the unauthorized software communica-tion,
Answers
D.
Implement a content filter to block the unauthorized software communica-tion,
Suggested answer: B

Explanation:

Containment is an incident response strategy that aims to isolate and prevent the spread of an attack or compromise within a network or system. It can resolve the issue of unauthorized software detected on a small number of machines in a lab as quickly as possible while causing minimal disruption to the researchers by stopping the software from communicating with external sources using HTTPS and SMS and preventing it from infecting additional machines outside of the lab

asked 02/10/2024
Ronakkumar Shyani
47 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first