A security administrator is hardening a TrustedSolaris server that processes sensitive data.
The data owner has established the following security requirements:
– The data is for internal consumption only and shall not be distributed to outside individuals
– The systems administrator should not have access to the data processed by the server
– The integrity of the kernel image is maintained
Which of the following host-based security controls BEST enforce the data owner’s requirements? (Choose three.)
A . SELinux
B . DLP
C . HIDS
D . Host-based firewall
E . Measured boot
F . Data encryption
G . Watermarking
Answer: CEF
Latest CAS-003 Dumps Valid Version with 509 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund