Your coworker identified a vulnerability for a 3rd party software solution hosted on premise. The coworker is out sick today and has asked you remediate this issue as quickly as possible. You have identified a patch to fix the security vulnerability from the vendor's official website. What step should you take NEXT?
Begin monitoring for related incidients
Start the incident response process
Install the patch immediately and inform affected users
Submit a change request based on the companies change management processes
Changes, even urgent ones, should be documented and approved based on company policy. This is typically called something like a "Change Request" or CR, or a "Request For Change" or RFC. This is the first step in deploying updates, configuration changes, etc.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a Change Request (CR) or Request For Change (RFC)?
Open an interactive chat with Bash
Why is it important to follow change management processes when applying patches?
Open an interactive chat with Bash
What are the common steps in the incident response process?