Which of the follow...
 
Notifications
Clear all

Which of the following would be the MOST appropriate to remediate the controller?

1 Posts
1 Users
0 Likes
117 Views
(@ripaharris)
Noble Member
Joined: 2 years ago
Posts: 737
Topic starter  

An analyst is working with a network engineer to resolve a vulnerability that was found in a piece of legacy hardware, which is critical to the operation of the organization's production line. The legacy hardware does not have third-party support, and the OEM manufacturer of the controller is no longer in operation. The analyst documents the activities and verifies these actions prevent remote exploitation of the vulnerability.

Which of the following would be the MOST appropriate to remediate the controller?

  • A . Segment the network to constrain access to administrative interfaces.
  • B . Replace the equipment that has third-party support.
  • C . Remove the legacy hardware from the network.
  • D . Install an IDS on the network between the switch and the legacy equipment.

Show Answer Hide Answer

Suggested Answer: A

   
Quote
Topic Tags

Latest CS0-002 V1 Dumps Valid Version

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund
Share: