Exam CAS-004 All QuestionsBrowse all questions from this exam
Question 367

A security engineer has recently become aware of a Java application that processes critical information in real time on the company's network. The Java application was scanned with SAST prior to deployment, and all vulnerabilities have been mitigated. However, some known issues within the Java runtime environment cannot be resolved. Which of the following should the security engineer recommend to the developer in order to mitigate the issue with the LEAST amount of downtime?

    Correct Answer: D

    Running the Java application in a virtual machine provides the best solution for mitigating issues with the Java runtime environment with the least amount of downtime. By embedding the application into a VM running on dedicated hardware, the application is isolated from the rest of the system. This containment method reduces the impact of any vulnerabilities by restricting them to the virtual machine. This solution offers an additional layer of security and isolation without the significant downtime that would be associated with rewriting the application or extensive testing in a sandbox.

Discussion
AnarckiiOption: D

D - makes the most sense if we are concerned about downtime

OdinAtlasSteelOption: D

D. Embed the current application into a virtual machine that runs on dedicated hardware. This solution involves using virtualization technology, where the Java application is encapsulated within a virtual machine (VM). This approach allows for isolation and containment of the application, and any issues with the Java runtime environment are confined within the VM. It provides a level of abstraction and separation from the underlying hardware and operating system.

oskinooOption: D

D. Embed the current application into a virtual machine that runs on dedicated hardware. By embedding the Java application into a virtual machine (VM) running on dedicated hardware, you can isolate the application and its environment. This approach allows you to run the Java application while minimizing the impact of known issues in the Java runtime environment. If there are vulnerabilities or issues within the Java runtime, they are less likely to impact the overall system when it's contained within a VM. It provides an additional layer of security and isolation, reducing downtime associated with resolving runtime issues.

weaponxcelOption: D

D. Embed the current application into a virtual machine that runs on dedicated hardware - By running the application in a dedicated virtual machine (VM), it's isolated from the rest of the environment. This containment reduces the potential impact of vulnerabilities in the Java runtime since they'd be restricted to the VM. Moreover, embedding an application into a VM typically has a shorter downtime than rewriting the application or extensive testing.

23169fdOption: B

Quick Implementation: Sandboxing can be set up quickly compared to the time and complexity involved in setting up a dedicated VM environment. Minimal Downtime: The application can continue running in the sandbox with minimal interruption, allowing for immediate security testing and mitigation efforts. Flexibility and Focus: Penetration testing within a sandbox provides a focused approach to identifying and addressing vulnerabilities without impacting the main production environment.

EAlonsoOption: D

D. reduce the attack surface in case the exploits.

joinedatthehopOption: A

Software Composition Analysis Identifies Risks in Open Source Packages. SCA tools identify all open source packages in an application and all the known vulnerabilities of those packages. This knowledge can be used to notify developers of the issues in their code to fix them before they are exploited.

b49eb27

They already know this is an issue so this does not help.

POWNEDOption: D

I agree the answer is D