A security technician received notification of a remotely exploitable vulnerability affecting all multifunction
printers firmware installed throughout the organization. The vulnerability allows a malicious user to review all the
documents processed by the affected printers. Which of the following compensating controls can the security
technician to mitigate the security risk of a sensitive document leak?
Create a separate printer network
Perform penetration testing to rule out false positives
Install patches on the print server
Run a full vulnerability scan of all the printers