List of questions
Related questions
Question 722 - CISSP discussion
An organization operates a legacy Industrial Control System (ICS) to support its core business service, which carrot be replaced. Its management MUST be performed remotely through an administrative console software, which in tum depends on an old version of the Java Runtime Environment (JPE) known to be vulnerable to a number of attacks, How is this risk BEST managed?
A.
Isolate the full ICS by moving It onto its own network segment
B.
Air-gap and harden the host used for management purposes
C.
Convince the management to decommission the ICS and mitigate to a modem technology
D.
Deploy a restrictive proxy between all clients and the vulnerable management station
Your answer:
0 comments
Sorted by
Leave a comment first