Exam4Training

Which of the following techniques would BEST support this?

An administrator wants to ensure hard drives cannot be removed from hosts and men installed into and read by unauthorized hosts.

Which of the following techniques would BEST support this?
A . Access control lists
B . TACACS+ server for AAA
C . File-level encryption
D . TPM with sealed storage

Answer: A

Latest CAS-003 Dumps Valid Version with 509 Q&As

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund

Exit mobile version