An organization discovered older sensors that cannot be updated. Attackers have been taking advantage of weaknesses to reach other systems in the environment. Which approach addresses these vulnerable devices while balancing operational requirements?
Enable remote logging on the environment to capture threat attempts
Apply advanced user access controls on these devices to deter intrusions
Segment these devices using a dedicated VLAN with restricted pathways
Remove the older sensors in favor of modern hardware
Older sensors that cannot be updated benefit from network isolation. A separate VLAN with restricted traffic paths hinders lateral movement and contains threats. Advanced user controls or audit logs do not fully address underlying vulnerabilities or limit interactions, and decommissioning is not valid when hardware must remain operational.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a VLAN?
Open an interactive chat with Bash
How does segmenting devices with a dedicated VLAN improve security?
Open an interactive chat with Bash
Why is decommissioning not always a valid option for older hardware?