{"id":3559,"date":"2023-12-03T18:54:07","date_gmt":"2023-12-03T18:54:07","guid":{"rendered":"https:\/\/exampracticetests.com\/c\/SY0-601\/comptia-security-sy0-601-question333\/"},"modified":"2023-12-03T18:54:07","modified_gmt":"2023-12-03T18:54:07","slug":"comptia-security-sy0-601-question333","status":"publish","type":"post","link":"https:\/\/exampracticetests.com\/c\/SY0-601\/comptia-security-sy0-601-question333\/","title":{"rendered":"CompTIA Security+ SY0-601 &#8211; Question333"},"content":{"rendered":"<div class=\"question\">While preparing a software inventory report, a security analyst discovers an unauthorized program installed on<br \/>\nmost of the company&#039;s servers. The program utilizes the same code signing certificate as an application<br \/>\ndeployed to only the accounting team. After removing the unauthorized program, which of the following<br \/>\nmitigations should the analyst implement to BEST secure the server environment?<br \/>\n<br \/><strong><br \/>A.<\/strong> Revoke the code signing certificate used by both programs.<br \/><strong>B.<\/strong> Block all unapproved file hashes from installation<br \/><strong>C.<\/strong> Add the accounting application file hash to the allowed list.<br \/><strong>D.<\/strong> Update the code signing certificate for the approved application.<\/div>\n<p><\/p>\n<style> .hidden-div{ display:none } <\/style>\n<p>\t\t\t\t\t\t\t<button onclick=\"getElementById('hidden-div').style.display = 'block'\"> Show Answer <\/button> <button onclick=\"getElementById('hidden-div').style.display = 'none'\">Hide Answer<\/button><\/p>\n<div class=\"hidden-div\" id=\"hidden-div\"><span style=\"\"><\/p>\n<div class=\"answer\">Correct Answer: <strong>A<\/strong><\/div>\n<p><strong>Explanation:<\/strong> <\/p>\n<div class=\"explanation\">\nReference: <a href=\"https:\/\/www.ssldragon.com\/blog\/how-to-use-code-signing-certificates\/\" title=\"External link\" rel=\"nofollow noopener\" target=\"_blank\">https:\/\/www.ssldragon.com\/blog\/how-to-use-code-signing-certificates\/<\/a><\/div>\n<p><\/strong><\/span> <\/div>\n","protected":false},"excerpt":{"rendered":"<p>While preparing a software inventory report, a security analyst discovers an unauthorized program installed on most of the company&#039;s servers. The program utilizes the same code signing certificate as an application deployed to only the accounting team. After removing the unauthorized program, which of the following mitigations should the analyst implement to BEST secure the [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[3,336],"class_list":["post-3559","post","type-post","status-publish","format-standard","hentry","category-comptia-security-sy0-601","tag-comptia-security-sy0-601","tag-question-333"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/exampracticetests.com\/c\/SY0-601\/wp-json\/wp\/v2\/posts\/3559","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/exampracticetests.com\/c\/SY0-601\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/exampracticetests.com\/c\/SY0-601\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/exampracticetests.com\/c\/SY0-601\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/exampracticetests.com\/c\/SY0-601\/wp-json\/wp\/v2\/comments?post=3559"}],"version-history":[{"count":0,"href":"https:\/\/exampracticetests.com\/c\/SY0-601\/wp-json\/wp\/v2\/posts\/3559\/revisions"}],"wp:attachment":[{"href":"https:\/\/exampracticetests.com\/c\/SY0-601\/wp-json\/wp\/v2\/media?parent=3559"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/exampracticetests.com\/c\/SY0-601\/wp-json\/wp\/v2\/categories?post=3559"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/exampracticetests.com\/c\/SY0-601\/wp-json\/wp\/v2\/tags?post=3559"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}