A systems administrator notices that one of the systems critical for processing customer transactions is running an end-of-life operating system. Which of the following techniques would increase enterprise security?
B. Placing the system in an isolated VLAN
Give that the system is critical for processing customer transactions, decommissioning immediately might impact business continuity. The next best approach is to place the system in an isolated VLAN.
Why would you "Decommission the system" when it is critical for transitions? The answer is B, Isolate it until you're ready to make the relevant changes or ready to replace it.
C. Decommissioning the system
The most secure option is to decommission the system entirely. End-of-life systems are no longer supported by the vendor, meaning they will not receive security patches. This makes them highly vulnerable to attacks. By decommissioning the system, the organization can eliminate the risk associated with it.
While the other options may provide some level of security, they do not address the fundamental issue of the system being end-of-life.
The best technique to increase enterprise security in this situation is:
B. Placing the system in an isolated VLAN
By placing the system in an isolated VLAN, the organization can reduce the risk of the outdated system being exploited by limiting its network exposure and controlling access to and from the critical system. This helps to minimize the impact that vulnerabilities in the end-of-life operating system could have on the broader network.
Placing the system in an isolated VLAN: This will physically separate the critical system from the rest of the network, reducing the risk of unauthorized access or attacks.
Installing HIDS on the system: While an HIDS can detect and alert on suspicious activity, it might not be enough to mitigate the risks associated with an end-of-life operating system, which lacks security updates and patches.
Decommissioning the system: This is a potential solution if the system can be replaced with a more secure alternative. However, if the system is critical for business operations, decommissioning it might not be feasible.
Encrypting the system's hard drive: Encryption can protect the data stored on the system, but it doesn't address the security vulnerabilities associated with an end-of-life operating system.
Yes, decommissioning the system is generally the most effective approach for addressing the security risks associated with running an end-of-life operating system.
GPT
This section is not available anymore. Please use the main Exam Page.SY0-701 Exam Questions
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
a4e15bd
Highly Voted 9 months agoMigzz
Highly Voted 9 months agoProudFather
Most Recent 5 months agonyyankee718
6 months agonillie
7 months, 1 week agoGlacier88
8 months, 2 weeks agoDharmesh16
9 months agoqacollin
9 months agoJusthereforcomptia
8 months, 4 weeks ago