A security manager is discussing change in the security posture of the network, if a proposed
application is approved for deployment. Which of the following is the MOST important the security
manager must rely upon to help make this determination?
A.
Ports used by new application
B.
Protocols/services used by new application
C.
Approved configuration items
D.
Current baseline configuration
Such badly written questions…sigh…at the end of the day, applications which are proposed for installation are very likely to in crease the security threat surface as they could…
* Add New services
* Open new ports
* Add dependancies (other dependant applications)
* May need to use of “new” protocols
So the best answer is: B – Protocols/services used by new application
1
0