Which of the following is the MOST effective method for dealing with the spreading of a network
worm that exploits vulnerability in a protocol?
Install the vendor’s security fix for the vulnerability.
Block the protocol traffic in the perimeter firewall.
Block the protocol traffic between internal network segments.
Stop the service until an appropriate security fix is installed.
Stopping the service and installing the security fix is the safest way to prevent the worm from
spreading, if the service is not stopped, installing the fix is not the most effective method because
the worm continues spreading until the fix becomes effective. Blocking the protocol on the perimeter
does not stop the worm from spreading to the internal network(s). Blocking the protocol helps to
slow down the spreading but also prohibits any software that utilizes it from working between