CompTIA CAS-005 Question Answer
An organization ' s vulnerability management team is reviewing the following output from a scan of a production server:
Finding ID | Summary
Weak cryptographic library | The device allows the use of weak cryptographic libraries.
End-of-life, third-party library | The running service includes an end-of-life, third-party library.
Remote service detected | The device is running FTP on TCP port 21.
End-of-life operating system | The operating system has reached end-of-life status.
Database detected | This device includes an installed database.
Which of the following should the team do first?

