A critical legacy device in an organization's operation cannot be upgraded with patches or firmware updates. Which approach best addresses the challenge of maintaining business requirements while reducing risk?
Update password requirements on the device to mitigate remote risks
Install an external patch from an unofficial vendor to mitigate risks
Place the device on a network segment with appropriate network filtering and monitoring measures
Replace the system with one developed internally that fulfills the necessary capabilities
Isolating the device with suitable network checks and observation can limit threats while maintaining necessary tasks. Deploying an external patch from an unofficial source introduces new uncertainty. Building a replacement system from scratch is often resource-intensive. Changing password requirements alone may not address deeper vulnerabilities in outdated hardware and software.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is network segmentation, and how does it help reduce risk for legacy devices?
Open an interactive chat with Bash
What are appropriate network filtering and monitoring measures?
Open an interactive chat with Bash
Why is using external patches from unofficial vendors risky?