Which of the following would be the MOST secure control implement?
An investigation showed a worm was introduced from an engineer’s laptop. It was determined the company does not provide engineers with company-owned laptops, which would be subject to a company policy and technical controls.
Which of the following would be the MOST secure control implement?
A . Deploy HIDS on all engineer-provided laptops, and put a new router in the management network.
B . Implement role-based group policies on the management network for client access.
C . Utilize a jump box that is only allowed to connect to client from the management network.
D . Deploy a company-wide approved engineering workstation for management access.
Answer: A
Latest CAS-003 Dumps Valid Version with 509 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund
Subscribe
Login
0 Comments
Inline Feedbacks
View all comments