A security technician received notification of a remotely exploitable vulnerability affecting all
multifunction printers firmware installed throughout the organization. The vulnerability allows a malicious
user to review all the documents processed by the affected printers. Which of the following
compensating controls can the security technician to mitigate the security risk of a sensitive document
leak?

A.
Create a separate printer network
B.
Perform penetration testing to rule out false positives
C.
Install patches on the print server
D.
Run a full vulnerability scan of all the printers
I think it’s A.
0
0