Question 2

0
64

A security administrator is hardening a TrustedSolaris server that processes sensitive data. The data owner has established the following security requirements:

  • The data is for internal consumption only and shall not be distributed to outside individuals
  • The systems administrator should not have access to the data processed by the server
  • The integrity of the kernel image is maintained

Which of the following host-based security controls BEST enforce the data owner’s requirements? (Choose three.)

A. SELinux
B. DLP
C. HIDS
D. Host-based firewall
E. Measured boot
F. Data encryption
G. Watermarking

Correct Answer: CEF

LEAVE A REPLY

Please enter your comment!
Please enter your name here