While preparing a software inventory report, a security analyst discovers an unauthorized program installed on
most of the company's servers. The program utilizes the same code signing certificate as an application
deployed to only the accounting team. After removing the unauthorized program, which of the following
mitigations should the analyst implement to BEST secure the server environment?
A. Revoke the code signing certificate used by both programs.
B. Block all unapproved file hashes from installation
C. Add the accounting application file hash to the allowed list.
D. Update the code signing certificate for the approved application.
most of the company's servers. The program utilizes the same code signing certificate as an application
deployed to only the accounting team. After removing the unauthorized program, which of the following
mitigations should the analyst implement to BEST secure the server environment?
A. Revoke the code signing certificate used by both programs.
B. Block all unapproved file hashes from installation
C. Add the accounting application file hash to the allowed list.
D. Update the code signing certificate for the approved application.