An analyst is working with a network engineer to resolve a vulnerability that was found in a piece of legacy hardware, which is critical to the operation of the organization's production line. The legacy hardware does not have third-party support, and the OEM manufacturer of the controller is no longer in operation. The analyst documents the activities and verifies these actions prevent remote exploitation of the vulnerability. Which of the following would be the MOST appropriate to remediate the controller?
A) Segment the network to constrain access to administrative interfaces.
B) Replace the equipment that has third-party support.
C) Remove the legacy hardware from the network.
D) Install an IDS on the network between the switch and the legacy equipment.
Correct Answer:
Verified
Q78: Clients are unable to access a company's
Q79: A company wants to establish a threat-hunting
Q80: A security analyst discovers accounts in sensitive
Q81: A security analyst is reviewing packet captures
Q82: A user's computer has been running slowly
Q84: An analyst is performing penetration testing and
Q85: A security analyst has received reports of
Q86: A cybersecurity analyst is contributing to a
Q87: A security analyst received an alert from
Q88: Data spillage occurred when an employee accidentally
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents