Which of the following security controls is the BEST to apply to this architecture?

Posted by: Pdfprep Category: CAS-001 Tags: , ,

A system architect has the following constraints from the customer:

– Confidentiality, Integrity, and Availability (CIA) are all of equal importance.

– Average availability must be at least 6 nines (99.9999%).

– All devices must support collaboration with every other user device.

– All devices must be VoIP and teleconference ready.

Which of the following security controls is the BEST to apply to this architecture?
A . Deployment of multiple standard images based on individual hardware configurations, employee choice of hardware and software requirements, triple redundancy of all processing equipment.
B . Enforcement of strict network access controls and bandwidth minimization techniques, a single standard software image, high speed processing, and distributed backups of all equipment in the datacenter.
C . Deployment of a unified VDI across all devices, SSD RAID in all servers, multiple identical hot sites, granting administrative rights to all users, backup of system critical data.
D . Enforcement of security policies on mobile/remote devices, standard images and device hardware configurations, multiple layers of redundancy, and backup on all storage devices.

Answer: D

Leave a Reply

Your email address will not be published.