A supplier needs to connect several laptops to an organization's network as part of their service agreement. These laptops will be operated and maintained by the supplier. Victor, a cybersecurity analyst for the organization, is concerned that these laptops could contain some vulnerabilities that could weaken the network's security posture. What can Victor do to mitigate the risk to other devices on the network without having direct administrative access to the supplier's laptops?
1) Require 2FA (two-factor authentication) on the laptops
2) Scan the laptops for vulnerabilities and patch them
3) Increase the encryption level of VPN used by the laptops
4) Implement a jumpbox system

Q&A Education