CompTIA CySA+ CS0-003 Practice Question
During a vulnerability assessment, it is discovered that a critical server running a legacy system cannot be patched immediately due to dependencies on outdated software. Which of the following BEST describes a compensating control that can be implemented to mitigate the risk?
Implement a firewall rule to block specific attack vectors targeting the vulnerability.
Increase logging and monitoring to detect any exploit attempts.
Disable unused services on the legacy server.
Conduct routine vulnerability scans to detect potential threats.