A security technician received notification of a remotely exploitable vulnerability affecting all multifunction printers firmware installed throughout the organization. The vulnerability allows a malicious user to review all the documents processed by the affected printers. Which of the following compensating controls can the security technician to mitigate the security risk of a sensitive document leak?
A. Create a separate printer network
B. Perform penetration testing to rule out false positives
C. Install patches on the print server
D. Run a full vulnerability scan of all the printers
Answer: C. Install patches on the print server
Computer Science & Information Technology
You might also like to view...
Which of the following views would you use to deliver a presentation using two monitors simultaneously?
A) Reading B) Outline C) Presenter D) Normal
Computer Science & Information Technology
The repetition operator ( *) works with strings as well as with lists.
a. true b. false
Computer Science & Information Technology