4
answers
1
watching
304
views

A high-severity vulnerability was found on a web application and introduced to the enterprise. The vulnerability could allow an unauthorized user to utilize an open-source library to view privileged user information. The enterprise is unwilling to accept the risk, but the developers cannot fix the issue right away.

Which of the following should be implemented to reduce the risk to an acceptable level until the issue can be fixed?

Options: A Scan the code with a static code analyzer, change privileged user passwords, and provide security training.
B Change privileged usernames, review the OS logs, and deploy hardware tokens.
C Implement MFA, review the application logs, and deploy a WAF.
D Deploy a VPN, configure an official open-source library repository, and perform a full application review for vulnerabilities.

For unlimited access to Homework Help, a Homework+ subscription is required.

Unlock all answers

Get 1 free homework help answer.
Already have an account? Log in
Already have an account? Log in
Avatar image
Read by 4 people
Already have an account? Log in
Avatar image
Read by 3 people
Already have an account? Log in

Related questions

Related Documents

Weekly leaderboard

Start filling in the gaps now
Log in