An organization that runs older applications discovers that certain individuals are researching software bugs in preparation for building harmful programs. Which measure best disrupts those plans by limiting exploitable weaknesses?
Post known software gaps on a community site to gather diverse feedback
Move every business process to a different building with restricted network links
Grant open access to all event logs across the environment
Deploy security updates consistently and validate each fix with rigorous testing
Updating programs on a consistent schedule and verifying each fix through thorough testing removes existing flaws that attackers might target. It also minimizes new weaknesses introduced by ongoing development. Infrastructure changes such as shifting facilities do not guarantee closure of potential code gaps. Publishing system weaknesses in a public channel could guide adversaries further. Unrestricted log access does not address or eliminate the vulnerabilities that harmful software targets.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why is it important to deploy security updates consistently?
Open an interactive chat with Bash
What does 'rigorous testing' involve after deploying security updates?
Open an interactive chat with Bash
How can organizations identify software vulnerabilities before attackers do?