A cybersecurity analyst discovers that a critical network component is running software that the vendor no longer supports. Which of the following actions should the analyst recommend to BEST mitigate the associated risk?
Increase monitoring of network traffic to and from the outdated component.
Isolate the component from the network until it can be updated or replaced.
Implement an AI-based security solution to detect anomalies related to the component.
Create a custom patch for the component's software.
Isolating the component is the best immediate mitigation strategy because it minimizes the chances of an attacker reaching and exploiting the outdated system. Once isolated, the business can plan for a replacement or upgrade. Patching is not an option since the vendor no longer supports the software. Increasing monitoring or relying on AI-based security solutions are valuable strategies but do not directly mitigate the risk associated with the use of end-of-life or outdated components.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why is isolating the component the best immediate step?
Open an interactive chat with Bash
What does it mean that the vendor no longer supports the software?
Open an interactive chat with Bash
What are the risks of increasing monitoring instead of isolating the component?