Exam4Training

Which of the following would be the MOST appropriate to remediate the controller?

An analyst is working with a network engineer to resolve a vulnerability that was found in a piece of legacy hardware, which is critical to the operation of the organization’s production line. The legacy hardware does not have third-party support, and the OEM manufacturer of the controller is no longer in operation. The analyst documents the activities and verifies these actions prevent remote exploitation of the vulnerability.

Which of the following would be the MOST appropriate to remediate the controller?
A . Segment the network to constrain access to administrative interfaces.
B . Replace the equipment that has third-party support.
C . Remove the legacy hardware from the network.
D . Install an IDS on the network between the switch and the legacy equipment.

Answer: A

Latest CS0-002 Dumps Valid Version with 220 Q&As

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund

Exit mobile version