A security audit has revealed that a process control terminal is vulnerable to malicious users installing and executing software on the system. The terminal is beyond end-of-life support and cannot be upgraded, so it is placed on a protected network segment. Which of the following would be MOST effective to implement to further mitigate the reported vulnerability?
A) DNS sinkholing
B) DLP rules on the terminal
C) An IP blacklist
D) Application whitelisting
Correct Answer:
Verified
Q99: During a routine scan of a wireless
Q100: A financial organization has adopted a new
Q101: An organization that is located in a
Q102: A security analyst is investigating an incident
Q103: A security analyst is looking for a
Q105: A security administrator needs to create a
Q106: A software developer needs to perform code-execution
Q107: When selecting a technical solution for identity
Q108: An organization's help desk is flooded with
Q109: A company is adopting a BYOD policy
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents