A cybersecurity analyst discovers that a critical network component is running software that the vendor no longer supports. Which of the following actions should the analyst recommend to BEST mitigate the associated risk?
Create a custom patch for the component's software.
Implement an AI-based security solution to detect anomalies related to the component.
Isolate the component from the network until it can be updated or replaced.
Increase monitoring of network traffic to and from the outdated component.
Isolating the component is the best immediate mitigation strategy because it minimizes the chances of an attacker reaching and exploiting the outdated system. Once isolated, the business can plan for a replacement or upgrade. Patching is not an option since the vendor no longer supports the software. Increasing monitoring or relying on AI-based security solutions are valuable strategies but do not directly mitigate the risk associated with the use of end-of-life or outdated components.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What does 'end-of-life' software mean, and why is it a risk?
Open an interactive chat with Bash
Why is isolating an outdated component better than just monitoring it?
Open an interactive chat with Bash
If the vendor doesn't provide patches, what are the long-term options for outdated components?