An organization relies on a legacy device running an outdated operating system that cannot be upgraded. Which approach best ensures it remains protected while still serving its intended function?
Open direct connectivity to external networks so the device can locate external fixes when they are released
Place it on an isolated network segment with tightly controlled traffic and continuously inspect logs for threats
Use third-party patches created by unaffiliated developers and install them on a regular schedule
Turn off all authentication features and keep it readily accessible for operators
Placing this system within a restricted network area and reviewing its traffic helps prevent external dangers from exploiting its unpatched state. Unverified repairs may introduce instability or fail to address the underlying flaws. Enabling public network pathways increases exposure. Eliminating access controls creates additional risk by removing user verification.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is an isolated network segment?
Open an interactive chat with Bash
How do you monitor logs for threats effectively?
Open an interactive chat with Bash
Why are third-party patches not recommended for legacy systems?