Which of the follow...
 
Notifications
Clear all

Which of the following would be MOST effective to implement to further mitigate the reported vulnerability?

1 Posts
1 Users
0 Likes
253 Views
(@ozolinsezequiel)
Noble Member
Joined: 2 years ago
Posts: 701
Topic starter  

A security audit has revealed that a process control terminal is vulnerable to malicious users installing and executing software on the system. The terminal is beyond end-of-life support and cannot be upgraded, so it is placed on a projected network segment.

Which of the following would be MOST effective to implement to further mitigate the reported vulnerability?

  • A . DNS sinkholding
  • B . DLP rules on the terminal
  • C . An IP blacklist
  • D . Application whitelisting

Show Answer Hide Answer

Suggested Answer: D

   
Quote

Latest CompTIA SY0-601 Dumps Valid Version

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund
Share: