A software development company needs to augment staff by hiring consultants for a high-stakes project.
The project has the following requirements:
– Consultants will have access to flighty confidential, proprietary data.
– Consultants will not be provided with company-owned assets.
– Work needs to start Immediately.
– Consultants will be provided with Internal email addresses for communications.
Which of the following solutions is the BEST method lor controlling data exfiltration during this project?
A . Require that all consultant activity be restricted to a secure VDI environment.
B . Require the consultants to sign an agreement stating they will only use the company-provided email address for communications during the project.
C . Require updated antivirus. USB blocking, and a host-based firewall on all consultant devices.
D . Require the consultants to conned to the company VPN when accessing confidential resources.
Answer: A
Latest SY0-501 Dumps Valid Version with 1130 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund