PdfPrep.com

Which of the following mitigation strategies should an information security manager recommend to the data owner?

Two new technical SMB security settings have been enforced and have also become policies that increase secure communications.

Network Client: Digitally sign communication

Network Server: Digitally sign communication

A storage administrator in a remote location with a legacy storage array, which contains time-sensitive data, reports employees can no longer connect to their department shares.

Which of the following mitigation strategies should an information security manager recommend to the data owner?
A . Accept the risk, reverse the settings for the remote location, and have the remote location file a risk exception until the legacy storage device can be upgraded
B . Accept the risk for the remote location, and reverse the settings indefinitely since the legacy storage device will not be upgraded
C . Mitigate the risk for the remote location by suggesting a move to a cloud service provider. Have the remote location request an indefinite risk exception for the use of cloud storage
D . Avoid the risk, leave the settings alone, and decommission the legacy storage device

Answer: A

Exit mobile version