Application logs show abnormal resource usage in a microservice that references an outdated library. Additional investigation reveals that the library contains a known security flaw. Which action is the best next step to reduce infiltration risk?
Collect usage statistics before taking further action
Deactivate automated scanning and rely on a vendor to provide a patch
Remove or update the outdated component and verify that functionality is maintained
Modify credentials to restrict access to the vulnerable microservice
Removing or updating the affected library helps ensure that the known flaw is addressed. Monitoring usage or changing credentials might be useful but does not fix the weakness itself. Deactivating regular scanning leaves hidden issues undetected and does not mitigate the exploit. Updating the library or removing it if it is not required helps secure the environment and maintain functionality.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a microservice in cloud computing?
Open an interactive chat with Bash
Why is updating a library important for security?
Open an interactive chat with Bash
How can you verify functionality after updating a library?