Your organization relies on a variety of hardware components from multiple vendors to maintain its data center operations. Recently, a widespread vulnerability was discovered in the supply chain affecting a specific model of server motherboards used in your data center. What is the most effective initial action to mitigate the risk associated with this vulnerability?
Train staff to recognize the signs of a compromised server that could result from this vulnerability.
Check for and apply official security patches from the affected hardware vendor.
Switch to a different hardware vendor not affected by the vulnerability.
Conduct an internal risk assessment to evaluate the impact of the vulnerability.
The first and most effective action is to check for and apply security patches released by the hardware vendor. This action directly addresses the specific vulnerability in your supply chain by ensuring that the hardware is updated with the latest protection measures provided by the vendor. While alternatives like switching suppliers, performing an internal risk assessment, or conducting staff training may contribute to an overall improvement in security posture, they do not immediately address the identified vulnerability at hand.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are security patches and why are they important?
Open an interactive chat with Bash
How do I check for security patches from hardware vendors?
Open an interactive chat with Bash
What are the risks of not applying security patches?