A security technician received notification of a remotely exploitable vulnerability affecting all multifunction printers firmware installed throughout the organization. The vulnerability allows a malicious user to review all the documents processed by the affected printers. Which of the following compensating controls can the security technician to mitigate the security risk of a sensitive document leak?

A. Create a separate printer network
B. Perform penetration testing to rule out false positives
C. Install patches on the print server
D. Run a full vulnerability scan of all the printers

Answer: C. Install patches on the print server

Computer Science & Information Technology

You might also like to view...

Which of the following views would you use to deliver a presentation using two monitors simultaneously?

A) Reading B) Outline C) Presenter D) Normal

Computer Science & Information Technology

The repetition operator ( *) works with strings as well as with lists.

a. true b. false

Computer Science & Information Technology