A security administrator needs a secure computing solution to use for all of the company’s security
audit log storage, and to act as a central server to execute security functions from. Which of the
following is the BEST option for the server in this scenario?
A.
A hardened Red Hat Enterprise Linux implementation running a software firewall
B.
Windows 7 with a secure domain policy and smartcard based authentication
C.
A hardened bastion host with a permit all policy implemented in a software firewall
D.
Solaris 10 with trusted extensions or SE Linux with a trusted policy