Which of the following is the MOST effective solution for preventing individuals external to the organization from modifying sensitive information on a corporate database?

Which of the following is the MOST effective solution for preventing individuals external to the
organization from modifying sensitive information on a corporate database?

Which of the following is the MOST effective solution for preventing individuals external to the
organization from modifying sensitive information on a corporate database?

A.
Screened subnets

B.
Information classification policies and procedures

C.
Role-based access controls

D.
Intrusion detection system (IDS)

Explanation:

Screened subnets are demilitarized zones (DMZs) and are oriented toward preventing attacks on
an internal network by external users. The policies and procedures to classify information will
ultimately result in better protection but they will not prevent actual modification. Role-based
access controls would help ensure that users only had access to files and systems appropriate for
their job role. Intrusion detection systems (IDS) are useful to detect invalid attempts but they will
not prevent attempts.



Leave a Reply 0

Your email address will not be published. Required fields are marked *