During an incident response, a cybersecurity analyst finds that an important security control is not functioning correctly. Which of the following measures should the analyst implement to maintain security and mitigate risks?
Isolating the compromised node from the network
Scheduling an emergency update of all software systems
Updating antivirus software on all connected devices
Implementing additional network monitoring and intrusion detection systems