Which of the following mitigation strategies should an information security manager recommend to the data owner?

Posted by: Pdfprep Category: CAS-003 Tags: , ,

Two new technical SMB security settings have been enforced and have also become policies that increase secure communications.

Network Client: Digitally sign communication

Network Server: Digitally sign communication

A storage administrator in a remote location with a legacy storage array, which contains time-sensitive data, reports employees can no longer connect to their department shares.

Which of the following mitigation strategies should an information security manager recommend to the data owner?
A . Accept the risk, reverse the settings for the remote location, and have the remote location file a risk exception until the legacy storage device can be upgraded
B . Accept the risk for the remote location, and reverse the settings indefinitely since the legacy storage device will not be upgraded
C . Mitigate the risk for the remote location by suggesting a move to a cloud service provider. Have the remote location request an indefinite risk exception for the use of cloud storage
D . Avoid the risk, leave the settings alone, and decommission the legacy storage device

Answer: A

Leave a Reply

Your email address will not be published.