Which of the following BEST reduces the security risks introduced when running systems that have expired vendor support and lack an immediate replacement?
A . Implement proper network access restrictions
B. Initiate a bug bounty program
B. Classify the system as shadow IT.
C. Increase the frequency of vulnerability scans
Answer: A
Latest SY0-601 Dumps Valid Version with 396 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund