A legacy application used for a critical business function relies on software that has reached the end of extended support. Which of the following is the MOST effective control to manage this application?
A.
Increase the frequency of regular system and data backups.
B.
Segment the application within the existing network.
C.
Apply patches for a newer version of the application.
D.
Subscribe to threat intelligence to monitor external attacks.
if confidentiality and integrity is the concern then network segmentation is an effective control.
If Availability is the concern then frequent backups is a effective solution. I am unsure from the question what are they referring to unless there is something missing in the question.
Segmenting the application within the existing network is the MOST effective control to manage the legacy application that relies on software that has reached the end of extended support.
When software reaches the end of its support period, it means that the vendor will no longer provide security patches and updates to address any newly discovered vulnerabilities. This makes the application more susceptible to attacks, and the organization needs to take steps to manage the risk.
upvoted 2 times
...
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
mynk29
3 months, 4 weeks agoCbtL
4 months, 2 weeks agojohn_boogieman
6 months, 3 weeks ago