CompTIA Security+ Question J-29

A security technician received notification of a remotely exploitable vulnerability affecting all multifunction printers firmware installed throughout the organization. The vulnerability allows a malicious user to review all the documents processed by the affected printers. Which of the following compensating controls can the security technician to mitigate the security risk of a sensitive document leak?

A. Create a separate printer network
B. Perform penetration testing to rule out false positives
C. Install patches on the print server
D. Run a full vulnerability scan of all the printers

Answer: C

CompTIA Security+ Question B-67

Visible security cameras are considered to be which of the following types of security controls?

A. Technical
B. Compensating
C. Deterrent
D. Administrative

Answer: C

Explanation:
Since a deterrent access control method is designed to discourage the violation of security policies, so a camera can be used to discourage individuals from taking unwanted action.