Which of the following host-based security controls BEST enforce the data owner’s requirements?

Posted by: Pdfprep Category: CAS-003 Tags: , ,

A security administrator is hardening a TrustedSolaris server that processes sensitive data.

The data owner has established the following security requirements:

– The data is for internal consumption only and shall not be distributed to outside individuals

– The systems administrator should not have access to the data processed by the server

– The integrity of the kernel image is maintained

Which of the following host-based security controls BEST enforce the data owner’s requirements? (Choose three.)
A . SELinux
B . DLP
C . HIDS
D . Host-based firewall
E . Measured boot
F . Data encryption
G . Watermarking

Answer: CEF

Leave a Reply

Your email address will not be published.