A security administrator is hardening a TrustedSolaris server that processes sensitive data. The data owner has established the following security requirements:
-The data is for internal consumption only and shall not be distributed to outside individuals
-The systems administrator should not have access to the data processed by the server
-The integrity of the kernel image is maintained
Which of the following host-based security controls BEST enforce the data owner’s requirements? (Choose three.)
A . SELinux
B . DLP
C . HIDS
D . Host-based firewall
E . Measured boot
F . Data encryption
G . Watermarking
Answer: C,E,F
Latest CAS-003 Dumps Valid Version with 509 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund