Which of the following host-based security controls BEST enforce the data owner’s requirements?

A security administrator is hardening a TrustedSolaris server that processes sensitive data.

The data owner has established the following security requirements:

– The data is for internal consumption only and shall not be distributed to outside individuals

– The systems administrator should not have access to the data processed by the server

– The integrity of the kernel image is maintained

Which of the following host-based security controls BEST enforce the data owner’s requirements? (Choose three.)
A . SELinux
B . DLP
C . HIDS
D . Host-based firewall
E . Measured boot
F . Data encryption
G . Watermarking

Answer: CEF

Latest CAS-003 Dumps Valid Version with 509 Q&As

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments