A manufacturing facility relies on older equipment running continuous processes. Recent logs revealed connections coming from outside the facility. Which action helps reduce these suspicious activities while continuing normal operations?
Separate the equipment from external traffic and watch connections to the environment
Provide wide network access to accommodate maintenance from offsite locations
Initiate routine firmware updates on all machines manually each shift
Power down production every weekend to reinstall operating software
Placing older equipment in a segmented environment limits external threats by restricting access and observing the traffic. This helps prevent unauthorized connections while allowing legitimate activities to continue. The other options either expand exposure or force downtime that can disrupt production, making them less suitable for protecting these systems.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What does it mean to segment a network?
Open an interactive chat with Bash
Why is older equipment more vulnerable to threats?
Open an interactive chat with Bash
How can logs help detect suspicious activities on a network?