1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
enot [183]
2 years ago
7

A regional transportation and logistics company recently hired its first ChiefInformation Security Officer (CISO). The CISO’s fi

rst project after onboardinginvolved performing a vulnerability assessment against the company’s publicfacing network. The completed scan found a legacy collaboration platformapplication with a critically rated vulnerability. While discussing this issue with theline of business, the CISO learns the vulnerable application cannot be updatedwithout the company incurring significant losses due to downtime or newsoftware purchases.
Required:
What BEST addresses these concerns?
Computers and Technology
1 answer:
Alja [10]2 years ago
5 0

There are different ways to create solutions to problem. What Best addresses these concerns is that;

  • The company should implement a WAF in front of the vulnerable application to filter out any traffic attempting to exploit the vulnerability.

<h3>How do firms use a WAF to protect their applications? </h3>
  • A WAF is known to be often used by firms to protects their web apps through the use of filtering, monitoring, and hindering (blocking)any forms of malicious HTTP/S traffic moving to the web application.

They often prevents any unauthorized data from leaving the app. This WF will be a useful approach to addresses these concerns in the above scenario.

See options below

Which of the following BEST addresses these concerns?

A. The company should plan future maintenance windows such legacy application can be updated as needed.

B. The CISO must accept the risk of the legacy application, as the cost of replacing the application greatly exceeds the risk to the company.

C. The company should implement a WAF in front of the vulnerable application to filter out any traffic attempting to exploit the vulnerability.

D. The company should build a parallel system and perform a cutover from the old application to the new application, with less downtime than an upgrade.

Learn more about vulnerability assessment from

brainly.com/question/25633298

You might be interested in
On early computers, every byte of data read or written was handled by the CPU (i.e., there was no DMA). What implications does t
grandymaker [24]

Answer:

Multiprogramming will be extremely difficult to be achieved.

Explanation:

If every byte of data read or written is handled by the CPU the implications this will have for multiprogramming are not going to be satisfactory.

This is because, unlike before, after the successful completion of the input and output process, the CPU of a computer is not entirely free to work on other instructions or processes.

5 0
3 years ago
What is the purpose of a fax cover sheet?
Deffense [45]
A fax cover sheet is the first sheet that gives all the information that is needed.
8 0
3 years ago
What is the best approach to testing a website
Ronch [10]

A vital part of any website project is the quality assurance stage. Prior to launch, final QA testing ensures that your site is working according to your expectations and that your site users won’t be frustrated with any non-functioning pages.

7 0
3 years ago
When you install the ipam server feature you will be prompted to install which other features? (choose all that apply.)
Nezavi [6.7K]

If you install the IPAM  server feature you will be prompted to install the other features are:

  • Option c. Group Policy Management
  • Option d. Windows Internal Database

<h3> Which server should a person install the IPAM server feature?</h3>

IPAM Server is known to be one that need to be installed on a kind of server known as the domain member computer running Windows Server.

One can also install it its later operating system. The IPAM server is said to be made as a single purpose server and it is one that need not be installed with other form of network infrastructure roles e.g.  DNS.

Hence, If you install the IPAM  server feature you will be prompted to install the other features are:

  • Option c. Group Policy Management
  • Option d. Windows Internal Database

Learn more about server  from

brainly.com/question/15243924

#SPJ1

See full question below

When you install the IPAM Server feature you will be prompted to install which other features? (Choose all that apply.)

a. Control Flow Guard

b. Scale Out File Server

c. Group Policy Management

d. Windows Internal Database

c. Group Policy Management

d. Windows Internal Database

8 0
1 year ago
What does module in Python do? How to install it? Thanks!
lyudmila [28]
A Python module is an extension file which contains programmable resources for a given translation unit. This is very much like a header file in C and C++, it's modularized data. For example, say I wanted to write a server/client script. I can't easily do so with Python out of the box. I would require the "socket" module which contains all of the functions, variables and data structures which allow for network programming.

network.py
___________
from socket import *

s = socket(AF_INET, SOCK_STREAM)
(...)
8 0
3 years ago
Other questions:
  • What is an example of constructive criticism for an employee who frequently arrives late?
    10·2 answers
  • Electronic files created on a computer using programs such as word software are considered to be
    15·1 answer
  • When troubleshooting a desktop motherboard, you discover the network port no longer works. What is the best and least expensive
    10·1 answer
  • I need help answering these questions!
    11·1 answer
  • What is an activity that can help you enhance the appearance of your computer’s desktop?
    13·1 answer
  • Information flows:
    11·1 answer
  • Which method do software testers use to isolate new code from the rest of the network during the test stage of the software deve
    15·1 answer
  • Owners of individual domains get to decide what content is published on their websites. Why might this autonomy be important to
    12·1 answer
  • I need help with workplace safety systems please help
    10·1 answer
  • You have been on the phone with a user in a remote office for 30 minutes troubleshooting their minor desktop problem. No matter
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!