What is an example of corrective control?
A. Encrypting the data in-flight and data-at-rest
B. Deploying role-based access control to manage permissions
C. Setting up user accounts and passwords to control unauthorized access
D. Running an antivirus program after denial of service
Answer: D
What is recommended for a SAN security architecture?
A. Multiple isolated layers of security
B. Multiple isolated solutions for security
C. Multiple integrated layers of security
D. Single hierarchical solution for security
Answer: C
No comments:
Post a Comment