Multiple Choice
A security audit has revealed that a process control terminal is vulnerable to malicious users installing and executing software on the system. The terminal is beyond end-of-life support and cannot be upgraded, so it is placed on a protected network segment. Which of the following would be MOST effective to implement to further mitigate the reported vulnerability?
A) DNS sinkholing
B) DLP rules on the terminal
C) An IP blacklist
D) Application whitelisting
Correct Answer:

Verified
Correct Answer:
Verified
Q23: When selecting a technical solution for identity
Q24: A security analyst is configuring a large
Q25: The Chief Financial Officer (CFO) of an
Q26: A company is adopting a BYOD policy
Q27: Phishing and spear-phishing attacks have been occurring
Q29: Which of the following are requirements that
Q30: A security engineer is reviewing log files
Q31: A company has drafted an insider-threat policy
Q32: A user enters a password to log
Q33: A company recently moved sensitive videos between