Which of the following is the use of the ACL in this situation an example of?
As part of a systems modernization program, the use of a weak encryption algorithm is identified m a wet se-vices API. The client using the API is unable to upgrade the system on its end which would support the use of a secure algorithm set As a temporary workaround the client provides its IP space and the network administrator Limits access to the API via an ACL to only the IP space held by the client .
Which of the following is the use of the ACL in this situation an example of?
A . Avoidance
B . Transference
C . Mitigation
D . Acceptance
E . Assessment
Answer: C
Latest CAS-003 Dumps Valid Version with 509 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund
Subscribe
Login
0 Comments
Inline Feedbacks
View all comments