A network administrator received a report stating a critical vulnerability was detected on an application that is
exposed to the internet. Which of the following is the appropriate NEXT step?
A. Check for the existence of a known exploit in order to assess the risk.
B. Immediately shut down the vulnerable application server.
C. Install a network access control agent on the server.
D. Deploy a new server to host the application.
exposed to the internet. Which of the following is the appropriate NEXT step?
A. Check for the existence of a known exploit in order to assess the risk.
B. Immediately shut down the vulnerable application server.
C. Install a network access control agent on the server.
D. Deploy a new server to host the application.