A security technician received notification of a remotely exploitable vulnerability affecting all multifunction
printers firmware installed throughout the organization. The vulnerability allows a malicious user to review all the
documents processed by the affected printers. Which of the following compensating controls can the security
technician to mitigate the security risk of a sensitive document leak?
A.
Create a separate printer network
B.
Perform penetration testing to rule out false positives
C.
Install patches on the print server
D.
Run a full vulnerability scan of all the printers