An information security department is required to remediate system vulnerabilities when they are discovered. Please select the three primary remediation methods that can be used on an affected system.
A.
Install software patch, Operate system, Maintain system
Software Patch: Corrects the vulnerability by updating the affected software.
Configuration Adjustment: Modifies system settings to reduce risk exposure.
Software Removal: Eliminates vulnerable software if a patch or adjustment is not feasible.
Comprehensive Approach:
These three methods cover a range of options to address system vulnerabilities effectively.
Supporting Reference:
CCISO emphasizes using a combination of remediation methods tailored to the specific vulnerability and system environment.
Contribute your Thoughts:
Chosen Answer:
This is a voting comment (?). You can switch to a simple comment. It is better to Upvote an existing comment if you don't have anything to add.
Submit