An organization relies on a legacy device running an outdated operating system that cannot be upgraded. Which approach best ensures it remains protected while still serving its intended function?
Use third-party patches created by unaffiliated developers and install them on a regular schedule
Place it on an isolated network segment with tightly controlled traffic and continuously inspect logs for threats
Open direct connectivity to external networks so the device can locate external fixes when they are released
Turn off all authentication features and keep it readily accessible for operators
Placing this system within a restricted network area and reviewing its traffic helps prevent external dangers from exploiting its unpatched state. Unverified repairs may introduce instability or fail to address the underlying flaws. Enabling public network pathways increases exposure. Eliminating access controls creates additional risk by removing user verification.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.