A facility with older systems on the production line needs stronger security measures but minimal downtime. Which option is the best way to reduce risk for legacy devices while maintaining operational continuity?
Create a dedicated zone for critical equipment and integrate patches after careful pilot testing
Use basic network gateways at the boundary and rely on them as an additional layer of defense
Push updates to relevant devices as soon as a pilot system is proven stable
Grant flexible remote connections so vendors can intervene when needed
Implementing an isolated segment with gradual system testing helps safeguard older equipment from malicious actors and limits the spread of potential threats. Gradual testing of patches and changes lessens the chance of disruption. Applying uniform updates across a broad set of systems can introduce unexpected failures. Enabling ample remote access can expose sensitive assets directly. Relying on perimeter defenses alone lacks internal safeguards for vulnerable systems.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why is creating a dedicated zone for critical equipment an effective security measure?
Open an interactive chat with Bash
What are the risks associated with pushing updates to legacy systems too quickly?
Open an interactive chat with Bash
How does remote access increase security risks for legacy systems?