139k views
1 vote
An engineer is reviewing the security architecture for an enterprise network. During the review, the engineer notices an undocumented node on the network.

Which of the following approaches can be utilized to determine how this node operates? (Choose two.)

A. Use reverse engineering and techniques
B. Assess the node within a continuous integration environment
C. Employ a static code analyzer
D. Review network and traffic logs
E. Use a penetration testing framework to analyze the node
F. Analyze the output of a ping sweep

User Aventinus
by
8.2k points

1 Answer

6 votes

Final answer:

To determine the operation of an undocumented node, reviewing network and traffic logs and using a penetration testing framework are effective approaches that help in understanding the node's communication patter and identifying security vulnerabilities.

Step-by-step explanation:

To determine how an undocumented node operates on the network, the most effective approaches would be to review network and traffic logs and use a penetration testing framework to analyze the node.

Both of these methods are proactive means of security analysis that help an engineer pinpoint issues and prevent potential security breaches within the network. They do not directly manipulate the node's operation but rather observe and test it to understand its behavior and security posture.

User Praxeolitic
by
7.5k points