7
answers
1
watching
253
views
myrrcenaryLv1
26 May 2023
A security compliance requirement states that specific environments that handle sensitive data must be protected by need-to-know restrictions and can only connect to authorized endpoints. The requirement also states that a DLP solution within the environment must be used to control the data from leaving the environment.
Which of the following should be implemented for privileged users so they can support the environment from their workstations while remaining compliant?
- NAC to control authorized endpoints
- FIM on the servers storing the data
- A jump box in the screened subnet
- A general VPN solution to the primary network
A security compliance requirement states that specific environments that handle sensitive data must be protected by need-to-know restrictions and can only connect to authorized endpoints. The requirement also states that a DLP solution within the environment must be used to control the data from leaving the environment.
Which of the following should be implemented for privileged users so they can support the environment from their workstations while remaining compliant?
- NAC to control authorized endpoints
- FIM on the servers storing the data
- A jump box in the screened subnet
- A general VPN solution to the primary network
Liked by myrrcenary and 1 others
26 May 2023
Liked by myrrcenary and 1 others
raj21chaharLv10
26 May 2023
Already have an account? Log in
Read by 1 person
Read by 1 person
qamarmalik3098Lv10
26 May 2023
Already have an account? Log in
Read by 1 person
26 May 2023
Already have an account? Log in
Read by 1 person
aramracla23Lv4
26 May 2023
Already have an account? Log in
Read by 1 person