An analyst is working with a network engineer to resolve a vulnerability that was found in a piece of legacy hardware, which is critical to the operation of the organization's production line. The legacy hardware does not have third-party support, and the OEM manufacturer of the controller is no longer in operation.
The analyst documents the activities and verifies these actions prevent remote exploitation of the vulnerability.
Which of the following would be the MOST appropriate to remediate the controller?
- A: Segment the network to constrain access to administrative interfaces.
- B: Replace the equipment that has third-party support.
- C: Remove the legacy hardware from the network.
- D: Install an IDS on the network between the switch and the legacy equipment.